Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
スポンサーリンク
概要
- 論文の詳細を見る
We propose a security model, referred as g-eCK model, for group key exchange that captures essentially all non-trivial leakage of static and ephemeral secret keys of participants, i.e., group key exchange version of extended Canetti-Krawczyk (eCK) model. Moreover, we propose the first one-round tripartite key exchange (3KE) protocol secure in the g-eCK model under the gap Bilinear Diffie-Hellman (gap BDH) assumption and in the random oracle model.
著者
-
Suzuki Koutarou
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
MANULIS Mark
University of Surrey
-
USTAOGLU Berkant
Izmir Institute of Technology
関連論文
- Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications(Protocols,Cryptography and Information Security)
- Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation(Application)(Cryptography and Information Security)
- Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
- Traceable Ring Signature
- M+1-st Price Auction Using Homomorphic Encryption(Special Section on Cryptography and Information Security)
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- Strongly Secure Predicate-Based Authenticated Key Exchange : Definition and Constructions
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange