Desmedt, Y; Lange, T; Burmester, M; (2007) Scalable authenticated tree based group key exchange for ad-hoc groups. In: Dietrich, S and Dhamija, R, (eds.) FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. (pp. 104 - 118). SPRINGER-VERLAG BERLIN
Full text not available from this repository.
Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.In this paper we recall a GKE due to Burmester and Desmedt which needs only O(log n) communication and computation complexity per user, rather than O(n) as in the more well-known Burmester-Desmedt protocol, and runs in a constant number of rounds. To achieve authenticated GKE one can apply compilers, however, the existing ones would need O(n) computation and communication thereby mitigating the advantages of the faster protocol. Our contribution is to extend an existing compiler so that it preserves the computation and communication complexity of the non-authenticated protocol. This is particularly important for tree based protocols.
|Title:||Scalable authenticated tree based group key exchange for ad-hoc groups|
|Event:||11th International Conference on Financial Cryptography and Data Security/1st International Workshop on Usable Security|
|Location:||Scarborough, TRINID & TOBAGO|
|Dates:||2007-02-12 - 2007-02-16|
|Keywords:||key distribution, group key exchange, tree based GKE, ad-hoc groups, forward security, authentication, anonymity, AGREEMENT, PROTOCOLS, SYSTEM, SECURE|
|UCL classification:||UCL > School of BEAMS > Faculty of Engineering Science > Computer Science|
Archive Staff Only: edit this record