A Comparison of GKE Protocols based on SIDH
Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid, Carlos Cid
2021
Abstract
End-to-end encryption enables secure communication without releasing the contents of messages to the system server. This is a crucial security technology, in particular to cloud services. Group Key Establishment (GKE) protocols are often needed to implement efficient group end-to-end encryption systems. Perhaps the most famous GKE protocol is the Broadcast Protocol, proposed by Burmester and Desmedt. In addition, they also proposed the Star-based Protocol, Tree-based Protocol, and Cyclic-based Protocol. These protocols are based on the Diffie-Hellman key exchange protocol, and therefor are not secure against attacks based on quantum computers. Recently, Furukawa et al. proposed an efficient GKE protocol by modifying the original Broadcast Protocol into a post-quantum GKE protocol based on the Supersingular Isogeny Diffie-Hellman key exchange (SIDH). In this paper, we extend their work by considering the remaining DH-based GKE protocols by Burmester and Desmedt post-quantum versions based on SIDH, and compare their efficiency. As a result, we confirm that the Broadcast Protocol is indeed the most efficient protocol in this post-quantum setting, in terms of both communication rounds and computation time.
DownloadPaper Citation
in Harvard Style
Okada H., Kiyomoto S. and Cid C. (2021). A Comparison of GKE Protocols based on SIDH. In Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT, ISBN 978-989-758-524-1, pages 507-514. DOI: 10.5220/0010547305070514
in Bibtex Style
@conference{secrypt21,
author={Hiroki Okada and Shinsaku Kiyomoto and Carlos Cid},
title={A Comparison of GKE Protocols based on SIDH},
booktitle={Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT,},
year={2021},
pages={507-514},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010547305070514},
isbn={978-989-758-524-1},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT,
TI - A Comparison of GKE Protocols based on SIDH
SN - 978-989-758-524-1
AU - Okada H.
AU - Kiyomoto S.
AU - Cid C.
PY - 2021
SP - 507
EP - 514
DO - 10.5220/0010547305070514