1 / 14

Authenticated Group Key Agreement and Friends

Giuseppe Ateniese, Michael Stiener and Gene Tsudik Presented by Young Hee Park November 11, 2005. Authenticated Group Key Agreement and Friends. 1. Outline. Introduction Authenticated 2-party Key Agreement Proposed Schemes Authenticated Group Key Agreement A-GDH protocol

omar
Download Presentation

Authenticated Group Key Agreement and Friends

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Giuseppe Ateniese, Michael Stiener and Gene Tsudik Presented by Young Hee Park November 11, 2005 Authenticated Group Key Agreement and Friends 1

  2. Outline • Introduction • Authenticated 2-party Key Agreement • Proposed Schemes • Authenticated Group Key Agreement • A-GDH protocol • Complete Group Key Authentication • SA-GDH protocol • Conclusions • Future Work

  3. Introduction • Secure and efficient communications among group members in dynamic peer groups • Group key establishment

  4. Introduction • Authenticated key agreement in dynamic peer groups • Extend 2-party authenticated key agreement to group Diffie-Hellman key agreement • Security services • Perfect forward secrecy (PFS) • Resistance to known-key attacks • Key authentication • Key confirmation and key integrity

  5. Notations

  6. M1 M2 Authenticated 2-party Key Agreement • 2-partyDiffie-Hellman key agreement M1M2 • Authenticated 2-party key agreement

  7. Authenticated Group Key Agreement • Overview of GDH.2 M1 M2 M3 M4

  8. Authenticated Group Key Agreement • A-GDH.2 M1 M2 M3 M4

  9. Authenticated Group Key Agreement • Provides perfect forward secrecy • Resistant to passive known key attacks • Weak form of key authentication • Key is not directly authenticated between arbitrary nodes • All key authentication is performed through Mn • No one can be sure of other members’ participation Complete group key authentication

  10. Complete Group Key Agreement(SA-GDH.2) M3 M1 M2 M4

  11. Complete Group Key Agreement • SA-GDH.2 • Advantages • Perfect forward secrecy • Resistance to know-key attacks • Complete key authentication • Each member can be aware of the exact membership • Disadvantages • More expensive than A-GDH.2 • Every member Mi requires n exponentiations • Every member Mi requires many pairwise keys(Kij)

  12. Communication and Computation Cost

  13. Conclusions • Secure authenticated key agreement protocol for dynamic peer groups • Extend 2-party authenticated key agreement to n parties authenticated key agreement • Provides perfect forward secrecy • Key authentication, key confirmation and integrity • Resistance to active attacks

  14. Future Work • Develop a general-purpose toolkit for key agreement and related security services in dynamic peer groups • Develop more efficient secure group key agreement protocol which provides the resistance to insider attacks and more group security services

More Related