Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round

  • Kashi Neupane
  • Rainer Steinwandt
  • Adriana Suárez Corona
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7712)


A compiler is presented which, in the random oracle model, allows to add perfect forward secrecy to any secure authenticated group key establishment protocol P which has at least one round. The compiler does not modify the session identifier and does not impose changes on the underlying public key infrastructure. Building on a secure unauthenticated 1-round 2-party key establishment Q with perfect forward secrecy as auxiliary input, P is transformed into an authenticated group key establishment protocol with perfect forward secrecy and with one more round than P.


protocol compiler group key establishment forward secrecy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [ABVS07]
    Abdalla, M., Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: (Password) Authenticated Key Establishment: From 2-Party to Group. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 499–514. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  2. [BCP01]
    Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. [BD94]
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  4. [Boh06]
    Bohli, J.-M.: A Framework for Robust Group Key Agreement. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 355–364. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. [BVS07]
    Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: Secure group key establishment revisited. International Journal of Information Security 6(4), 243–254 (2007)CrossRefGoogle Scholar
  6. [GBNM10]
    Gorantla, M.C., Boyd, C., González Nieto, J.M., Manulis, M.: Generic One Round Group Key Exchange in the Standard Model. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 1–15. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. [KLC+00]
    Ko, K.H., Lee, S.-J., Cheon, J.H., Han, J.W., Kang, J.-S., Park, C.: New Public-Key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 166–183. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. [KY03]
    Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. [NPW11]
    Nam, J., Paik, J., Won, D.: A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Information Sciences 181(1), 234–238 (2011)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Kashi Neupane
    • 1
  • Rainer Steinwandt
    • 2
  • Adriana Suárez Corona
    • 2
  1. 1.Atlanta Metropolitan State CollegeAtlantaUSA
  2. 2.Florida Atlantic UniversityBoca RatonUSA

Personalised recommendations