260 likes | 341 Views
Pairwise Key Agreement in Broadcasting Networks. - 2005.11.11 - Ik Rae Jeong. Contents. Security Notions of Key Exchange Type of Networks Key Agreement for Key Graphs. Security Notions of Key Exchange. IA (Implicit Authentication)
E N D
Pairwise Key Agreement in Broadcasting Networks - 2005.11.11 - Ik Rae Jeong
Contents • Security Notions of Key Exchange • Type of Networks • Key Agreement for Key Graphs
Security Notions of Key Exchange • IA (Implicit Authentication) • Only a designated party can calculate the same session key. Dishonest parties can not get any information about the session key. • KI (Key Independence) • security against Denning-Sacco attacks (known key attacks) • for the cases when other session keys are revealed • FS (Forward Secrecy) • for the cases when long-term secrets are revealed
Types of Network • half-duplex • full-duplex Alice Bob 4 Rounds Alice Bob 2 Rounds
Types of Network • Broadcasting Network P3 P1 P2 P4 Round 1 Round 2
DH (half-duplex) Bob Alice 2 Rounds
DH (full-duplex) Bob Alice 1 Round
Session Identifier • The unique string per session • Used to define matching session in the definition of security of key exchange • In the full-duplex channel: the message concatenation by the ordering of owners
III. Key Agreement for Key Graphs • We have constructed more efficient key exchange schemes which provides pairwise key exchange between parties via randomness re-use technique.
Sequential Key Exchangebetween Parties P2 P1 P4 P3
Concurrent Key Exchangebetween Parties P2 P1 P4 P3
Motivation • How do we efficiently do concurrent execution of the two-party key exchange scheme ?
Our Results • An efficient one-round key exchange scheme providing key independence in the standard model • A two-round key exchange scheme providing forward secrecy in the standard model
P2 P1 P4 P3 P2 P1 P4 P3 Key Graphfor Session keys (1) G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3),(P1,P4)} G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P2,P3),(P3,P4), (P4,P1)}
P1 P2 P3 P4 P6 P5 P7 P2 P1 P4 P3 Key Graphfor Session keys (2) G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3), (P2,P4), (P2,P5), (P3,P6), (P3,P7)} G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3),(P1,P4), (P2,P3),(P2,P4),(P3,P4)}
Key Exchange Model for Key Graphs • Broadcasting network • Several session keys in a single session
One-Round Concurrent Key Exchange using Two-Party Key Exchange P2 P1 P4 P3 P1 requires three random values.
One-Round Concurrent Key Exchange using randomness re-use technique P2 P1 P4 P3 P1 requires one random values.
Randomness Re-useunder the DDH assumption • Pairwise DDH assumption 1 Exp
Randomness Re-useunder the DDH assumption • Pairwise DDH assumption 2 Exp
F is a pseudo random function PKA1 KI in the standard model P3 P1 P2 P4 Round 1:
PKA2 FS in the standard model P3 P1 P2 P4 Round 1:
Security • PKA1 and PKA2 • reduced to the DDH problem in the standard model
Discussion • Key exchange for key graph is an extension of two-party key exchange. • Key exchange for key graph can be used as a subprotocol of another protocol such as group key exchange protocols.