SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT

Kashi Neupane, Rainer Steinwandt

Abstract

Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and integrity of the protocol are still guaranteed.

References

  1. Bellare, M., Desai, A., Jokipii, E., and Rogaway, P. (2000a). A Concrete Security Treatment of Symmetric Encryption. Available at http://cseweb.ucsd.edu/~mihir/papers/sym-enc.html. Extended abstract in (Boneh and Franklin, 2001).
  2. Bellare, M., Pointcheval, D., and Rogaway, P. (2000b). Authenticated Key Exchange Secure against Dictionary Attacks. In Preneel, B., editor, Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 139-155. Springer.
  3. Bohli, J.-M., Müller-Quade, J., and Röhrich, S. (2007a). Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security, chapter Long-term Secure Key Establishment, pages 87-95. Nova Science Publishers.
  4. Bohli, J.-M., Vasco, M. I. G., and Steinwandt, R. (2007b). Secure group key establishment revisited. International Journal of Information Security, 6(4):243-254.
  5. Boneh, D. and Franklin, M. (2001). Identity-Based Encryption from the Weil Pairing. In Kilian, J., editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213- 229. Springer-Verlag.
  6. Boneh, D. and Franklin, M. (2003). Identity-Based Encryption from the Weil Pairing. SIAM Journal of Computing, 32(3):586-615. Available at http://crypto.stanford.edu/~dabo/papers/bfibe.pdf; extended abstract in (Boneh and Franklin, 2001).
  7. Bresson, E., Chevassut, O., Pointcheval, D., and Quisquater, J.-J. (2001). Provably Authenticated Group DiffieHellman Key Exchange. In Proceedings of the 8th ACM conference on Computer and Communications Security CCS'01, pages 255-264. ACM.
Download


Paper Citation


in Harvard Style

Neupane K. and Steinwandt R. (2010). SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 372-378. DOI: 10.5220/0002983503720378


in Bibtex Style

@conference{secrypt10,
author={Kashi Neupane and Rainer Steinwandt},
title={SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={372-378},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002983503720378},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT
SN - 978-989-8425-18-8
AU - Neupane K.
AU - Steinwandt R.
PY - 2010
SP - 372
EP - 378
DO - 10.5220/0002983503720378