Secure Group Communications over Combined Wired and Wireless Networks

  • Junghyun Nam
  • Seungjoo Kim
  • Dongho Won
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3592)

Abstract

This paper considers the fundamental problem of key agreement among a group of parties communicating over an insecure public network. Over the years, a number of solutions to this problem have been proposed with varying degrees of complexity. However, there seems to have been no previous systematic look at the growing problem of key agreement over combined wired and wireless networks, consisting of both high-performance computing machines and low-power mobile devices. In this paper we present an efficient group key agreement scheme well suited for this networking environment. Our construction is intuitively simple, and yet offers a scalable solution to the problem.

Keywords

Group key agreement combined wired and wireless networks mobile devices DDH assumption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18(4), 628–639 (2000)CrossRefGoogle Scholar
  2. 2.
    Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: The insecurity of 802.11. In: Proc. of ACM MobiCom 2001, pp. 180–189 (2001)Google Scholar
  3. 3.
    Becker, K., Wille, U.: Communication complexity of group key distribution. In: Proc. of ACM CCS 1998, pp. 1–6 (1998)Google Scholar
  4. 4.
    Boyd, C., Nieto, J.M.G.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 115–129. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Bresson, E., Chevassut, O., Essiari, A., Pointcheval, D.: Mutual authentication and group key agreement for low-power mobile devices. In: Proc. of the 5th IFIP-TC6/IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2003), pp. 59–62 (2003)Google Scholar
  7. 7.
    Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: Proc. of ACM CCS 2001, pp. 255–264 (2001)Google Scholar
  8. 8.
    Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  9. 9.
    Diffie, W., Hellman, M.E.: New Directions in cryptography. IEEE Trans. on Information Theory 22(6), 644–654 (1976)MATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Diffie, W., Oorschot, P., Wiener, M.: Authentication and authenticated key exchanges. Designs, Codes, and Cryptography 2(2), 107–125 (1992)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Information Theory 28(5), 714–720 (1982)MATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Perrig, A., Song, D., Tygar, J.D.: ELK, a new protocol for efficient large-group key distribution. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 247–262 (2001)Google Scholar
  14. 14.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proc. of ACM CCS 1996, pp. 31–37 (1996)Google Scholar
  15. 15.
    Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. In: Proc. of ACM SIGCOMM 1998, pp. 68–79 (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Junghyun Nam
    • 1
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Department of Computer EngineeringSungkyunkwan UniversityKorea

Personalised recommendations