Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
نویسنده
چکیده
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and without any subsequent communication; this, in addition to the classical group key shared amongst all the users. We show that GKE protocols enriched in this way impose new security challenges concerning the secrecy and independence of both key types. The special attention should be paid to possible collusion attacks aiming to break the secrecy of p2p keys possibly established between any two non-colluding users. In our constructions we utilize the well-known parallel Diffie-Hellman key exchange (PDHKE) technique in which each party uses the same exponent for the computation of p2p keys with its peers. First, we consider PDHKE in GKE protocols where parties securely transport their secrets for the establishment of the group key. For this we use an efficient multi-recipient ElGamal encryption scheme. Further, based on PDHKE we design a generic compiler for GKE protocols that extend the classical Diffie-Hellman method. Finally, we investigate possible optimizations of these protocols allowing parties to re-use their exponents to compute both group and p2p keys, and show that not all such GKE protocols can be optimized.
منابع مشابه
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communication and exchange of data. At any time point concurrent communication sessions involving different subsets of users can be invoked. The traditional tool for achieving security in a multi-party communication environment ...
متن کاملFlexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communication and exchange of data. At any time point concurrent communication sessions involving different subsets of users can be invoked. The traditional tool for achieving security in a multi-party communication environment ...
متن کاملA qualitative study of adolescents, parents and key informants\' experiences towards the importance of peer groups
Background and Purpose: One landmark of adolescence is the increasing value young people place on friendship and relationship with peers.The aim of this study was to determine adolescents and key informants’ perceptions and experiences regarding to importance of peer groups. Methods: Sixty-seven female adolescents (12–19 years) and 11 key informants, recruited from urban and rural areas from S...
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملTaxonomy of Global Air Transport
Data from the United Nations and the International Civil Aviation Organization Information Systems were used as a base for characterizing, classifying and comparing air transport demand and supply features of 156 countries. Relevant data from 1980 were chosen to reflect five sets of characteristics namely, air transport, 50cm-economic status, population demography, geographical and environmenta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009