Scalable Deniable Group Key Establishment
The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform unauthenticated group key establishment protocols into authenticated ones. In this paper we present a modification of Katz and Yung’s construction which maintains the round complexity of their compiler, but for ‘typical’ unauthenticated group key establishments adds authentication in such a way that deniability is achieved as well. As an application, a deniable authenticated group key establishment with three rounds of communication can be constructed.
KeywordsGroup key establishment Deniability
Unable to display preview. Download preview PDF.
- 1.Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Full paper of an extended abstract that appeared in the Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE (August 1997)Google Scholar
- 6.Chen, S., Cheng, Q., Ma, C.: A Deniable Group Key Exchange Protocol for Imbalanced Wireless Networks. In: Hu, B., Li, X., Yan, J. (eds.) 5th International Conference on Pervasive Computing and Applications (ICPCA 2010), pp. 1–5. IEEE (2010)Google Scholar
- 7.Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable Authentication and Key Exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 400–409. ACM (2006)Google Scholar