Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.1.59

Efficient Password-based Group Key Exchange Protocol  

황정연 (고려대학교)
최규영 (고려대학교)
이동훈 (고려대학교)
백종명 (유비넷㈜)
Abstract
Password-based authenticated group key exchange protocols provide a group of user, communicating over a public(insecure) channel and holding a common human-memorable password, with a session key to be used to construct secure multicast sessions for data integrity and confidentiality. In this paper, we present a password-based authenticated group key exchange protocol and prove the security in the random oracle model and the ideal cipher model under the intractability of the decisional Diffie-Hellman(DH) problem and computational DH problem. The protocol is scalable, i.e. constant round and with O(1) exponentiations per user, and provides forward secrecy.
Keywords
password-based group key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Bresson. 0. Chevassut and D. Pointcheval. "Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks', Advances in Cryptology Asiacrypt'02, Lecture Notes in Computer Science Vol. 2501, Springer-Verlag, pp. 497-514, 2002   DOI   ScienceOn
2 E. Bresson, 0. Chevassut, D. Pointcheval and J-J Quisquater, 'Provably Authenticated Group Diffie-Hellman Key Exchange', In Proc. of 8th ACM CCCS. pp. 255-264, November 2002
3 S. Bellovin and M. Merritt, 'Encrypted key exchange: Password-based protocols secure against dictionary attacks', In Proceedings of the Symposium on Security and Privacy, pp. 72-84 IEEE, 1992
4 J. Katz, R. Ostrovsky and M. Yung, 'Efficient password-authenticated key exchange using human-memorable passwords', Advances in Cryptology Eurocrypt'Ol, Lecture Notes in Computer Science Vol. 2045. Springer-Verlag, pp. 475-494, 2001   DOI   ScienceOn
5 M. Bellare, D. Pointcheaval, and P. Rogaway. 'Authenticated key exchange secure against dictionary attacks', Advances in Cryptology Eurocrypt'OO, Lecture Notes in Computer Science. Vol. 1807, Springer-VerIag. pp. 139-155. 2000   DOI   ScienceOn
6 S. M. Lee, H. J. Kim. D. H. Lee. J. I. Lim and C. S. Park'Scalable Gruop Key Management with Minimally Trusted Third Party', In 4th International Workshop on Information Security Applications, pp. 575-583, Aug 2003
7 V. Boyko, P. MacKenzie and S. Patal 'Provably secure password-authenticated key exchange using Diffie-Hellman', In B. Prenel, editor, Advances in Cryptology Eurocrypt'OO, Lecture Notes in Computer Science Vol. 1807. Springer-Verlag. pp. 156-171, 2000   DOI   ScienceOn
8 O. Goldreich and Y. Lindell. 'Sessionkey generation using human passwords only', In J. Killian editors, Advances in Cryptology, Crypto'Ol, Lecture Notes in Computer Science Vol. 2139. Springer-Verlag, pp. 408-432, 2001   DOI   ScienceOn