Abstract
A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. The compiler introduces neither idealizing assumptions nor high-entropy secrets, e. g., for signing. In particular, applying the compiler to a password-authenticated 2-party key establishment without random oracle assumption, yields a password-authenticated group key establishment without random oracle assumption. Our main technical tools are non-interactive and non-malleable commitment schemes that can be implemented in the common reference string (CRS) model.
Chapter PDF
Similar content being viewed by others
Keywords
References
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-Based Authenticated Key Exchange in the Three-Party Setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-Based Authenticated Key Exchange in the Three-Party Setting. IEE Proceedings – Information Security 153(1), 27–39 (2006)
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)
Bellare, M., Rogaway, P.: Entitiy Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)
Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: Secure Group Key Establishment Revisited. Cryptology ePrint Archive, Report, 2005/395 (2005), Available at, http://eprint.iacr.org/2005/395/
Bohli, J.-M., Vasco, M.I.G., Steinwandt, R.: Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String. Cryptology ePrint Archive: Report, 2006/214 (2006), Available at, http://eprint.iacr.org/2006/214
Boyko, V., MacKenczie, P.D., Patel, S.: Provable-Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Burmester, M., Desmedt, Y.G.: Efficient and Secure Conference-Key Distribution. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 119–129. Springer, Heidelberg (1997)
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally Composable Password-Based Key Exchange. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 404–421. Springer, Heidelberg (2005)
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)
Dolev, D., Dwork, C., Naor, M.: Non-Malleable Cryptography. SIAM Journal of Computing 30(2), 391–437 (2000)
Dutta, R., Barua, R.: Password-Based Encrypted Group Key Agreement. International Journal of Network Security 3(1), 23–34 (2006)
Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange. Cryptology ePrint Archive: Report, 2003/032 (2003), Available at, http://eprint.iacr.org/2003/032
Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange (Extended Abstract). In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 524–543. Springer, Heidelberg (2003)
Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 408–432. Springer, Heidelberg (2001)
Hwang, J.Y., Lee, S.-M., Lee, D.H.: Scalable key exchange transformation: from two-party to group. Electronic Letters 40(12), 728–729 (2004)
Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)
Katz, J., Ostrovsky, R., Yung, M.: Forward Secrecy in Password-Only Key Exchange Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 29–44. Springer, Heidelberg (2003)
Katz, J., Ostrovsky, R., Yung, M.: Efficient and Secure Authenticated Key Exchange Using Weak Passwords (2006), Available at, http://www.cs.umd.edu/~jkatz/papers/password.pdf
Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. Cryptology ePrint Archive: Report, 2005/163 (2005), Available at, http://eprint.iacr.org/2005/163
Kawczyck, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. Cryptology ePrint Archive: Report, 2005/176 (2005), Available at, http://eprint.iacr.org/2005/176
Krawczyck, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)
Lee, S.M., Hwang, J.Y., Lee, D.H.: Efficient Password-Based Group Key Exchange. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 191–199. Springer, Heidelberg (2004)
Mayer, A., Yung, M.: Secure Protocol Transformation via “Expansion”: From Two-party to Groups. In: Proceedings of the 6th ACM conference on Computer and Communications Security CCS ’99, pp. 83–92. ACM Press, New York (1999)
Menezes, A.: Another look at HMQV. Cryptology ePrint Archive: Report, 2005/205 (2005), Available at, http://eprint.iacr.org/2005/205
Menezes, A., Qu, M., Vanstone, S.A.: Some new key agreement protocols providing mutual implicit authentication. In: Workshop on Selected Areas in Cryptography, July, pp. 22–32 (1995)
Tang, Q., Choo, K.-K.R.: Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 162–177. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Abdalla, M., Bohli, JM., Vasco, M.I.G., Steinwandt, R. (2007). (Password) Authenticated Key Establishment: From 2-Party to Group. In: Vadhan, S.P. (eds) Theory of Cryptography. TCC 2007. Lecture Notes in Computer Science, vol 4392. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70936-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-70936-7_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70935-0
Online ISBN: 978-3-540-70936-7
eBook Packages: Computer ScienceComputer Science (R0)