260 likes | 353 Views
Explore key exchange schemes for secure communication in broadcasting networks, with focus on key independence and forward secrecy. Learn about session identifiers, key graphs, and concurrent key exchange strategies. 8 Relevant
E N D
Pairwise Key Agreement in Broadcasting Networks - 2005.11.11 - Ik Rae Jeong
Contents • Security Notions of Key Exchange • Type of Networks • Key Agreement for Key Graphs
Security Notions of Key Exchange • IA (Implicit Authentication) • Only a designated party can calculate the same session key. Dishonest parties can not get any information about the session key. • KI (Key Independence) • security against Denning-Sacco attacks (known key attacks) • for the cases when other session keys are revealed • FS (Forward Secrecy) • for the cases when long-term secrets are revealed
Types of Network • half-duplex • full-duplex Alice Bob 4 Rounds Alice Bob 2 Rounds
Types of Network • Broadcasting Network P3 P1 P2 P4 Round 1 Round 2
DH (half-duplex) Bob Alice 2 Rounds
DH (full-duplex) Bob Alice 1 Round
Session Identifier • The unique string per session • Used to define matching session in the definition of security of key exchange • In the full-duplex channel: the message concatenation by the ordering of owners
III. Key Agreement for Key Graphs • We have constructed more efficient key exchange schemes which provides pairwise key exchange between parties via randomness re-use technique.
Sequential Key Exchangebetween Parties P2 P1 P4 P3
Concurrent Key Exchangebetween Parties P2 P1 P4 P3
Motivation • How do we efficiently do concurrent execution of the two-party key exchange scheme ?
Our Results • An efficient one-round key exchange scheme providing key independence in the standard model • A two-round key exchange scheme providing forward secrecy in the standard model
P2 P1 P4 P3 P2 P1 P4 P3 Key Graphfor Session keys (1) G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3),(P1,P4)} G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P2,P3),(P3,P4), (P4,P1)}
P1 P2 P3 P4 P6 P5 P7 P2 P1 P4 P3 Key Graphfor Session keys (2) G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3), (P2,P4), (P2,P5), (P3,P6), (P3,P7)} G={V,E} V={P1,P2,P3,P4} E={(P1,P2),(P1,P3),(P1,P4), (P2,P3),(P2,P4),(P3,P4)}
Key Exchange Model for Key Graphs • Broadcasting network • Several session keys in a single session
One-Round Concurrent Key Exchange using Two-Party Key Exchange P2 P1 P4 P3 P1 requires three random values.
One-Round Concurrent Key Exchange using randomness re-use technique P2 P1 P4 P3 P1 requires one random values.
Randomness Re-useunder the DDH assumption • Pairwise DDH assumption 1 Exp
Randomness Re-useunder the DDH assumption • Pairwise DDH assumption 2 Exp
F is a pseudo random function PKA1 KI in the standard model P3 P1 P2 P4 Round 1:
PKA2 FS in the standard model P3 P1 P2 P4 Round 1:
Security • PKA1 and PKA2 • reduced to the DDH problem in the standard model
Discussion • Key exchange for key graph is an extension of two-party key exchange. • Key exchange for key graph can be used as a subprotocol of another protocol such as group key exchange protocols.