Niveau: Supérieur, Doctorat, Bac+8
An extended abstract of this work appeared in: Annual Symposium on InformAtion, Computer and Communications Security – Proceedings of ACM ASIA CCS '08 (March 18–20, 2008, Tokyo, JP) V. Gligor and M. Abe, Eds., ACM Press, pages 249–260 Securing Group Key Exchange against Strong Corruptions [Full version] Emmanuel Bresson1 and Mark Manulis2 1 DCSSI Crypto Lab, Paris, France 2 UCL Crypto Group, Louvain-la-Neuve, Belgium Abstract. When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong cor- ruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task — the aim of our paper. We start by investigating the current setting of strong corruptions and derive some further re- finements such as opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but “opened” users.
- group key
- ephemeral secret
- users without being
- protocol
- attacks
- security
- strong forward
- adversary can