Communication-efficient Group Key Agreement
June 20, 2001 Gene Tsudik, UC Irvine gts@ics.uci.edu Joint work with:
Adrian Perrig, CMU/UC Berkeley Yongdae Kim, USC/UC Irvine
Communication-efficient Group Key Agreement June 20, 2001 Gene - - PowerPoint PPT Presentation
Communication-efficient Group Key Agreement June 20, 2001 Gene Tsudik, UC Irvine gts@ics.uci.edu Joint work with: Adrian Perrig, CMU/UC Berkeley Yongdae Kim, USC/UC Irvine Outline Definitions/concepts Related work
Adrian Perrig, CMU/UC Berkeley Yongdae Kim, USC/UC Irvine
2
3
Single-source broadcast: Cable/sat. TV Multi-source: Televised debates, GPS In general, Internet-style IP multicast
Collaborative applications (peer groups) Video/Audio conferencing, collaborative workspaces, interactive
Rich communication semantics, tighter control, more emphasis on
4
5
6
One party generates a secret key and distributes to others.
Secret key is derived jointly by two or more parties. Key is a function of information contributed by each member. No party can pre-determine the result.
7
Single point of failure Attractive attack target
Must be available in all possible partitions Network can have arbitrary faults (eg, ad hoc)
8
1.
2.
9
10
Strong security Support for dynamic membership Robustness Efficiency in
communication
and
computation
11
12
8 ms Pentium II 450 20 ms Sun Ultra 250 4 ms Pentium III 800 1024-bit mod exp
13
14
Computation speed increases much fast than communication
Retransmissions
420 ms UCI ↔ Thailand 670 ms UCI ↔ Mozambique 88 ms / 20(ls) UCI ↔ Columbia U Communication roundtrip (Ping)
15
computationally infeasible for a passive adversary to discover any
Any subset of group keys cannot be used to discover previous
Any subset of group keys cannot be used to discover subsequent
Any subset of group keys cannot be used to discover any other
Forward + Backward secrecy
16
17
18
ACM CCS 2000
CRYPTO’88
Static groups No security proof
19
p – large prime (e.g. 512 or 1024 bits) Zp* = {1, 2, … , p – 1} g – base generator
n1 = gn1n2 mod p
n2 = gn1n2 mod p
20
Loose Definition: Given ga, gb, computing gab is hard. CDH is not sufficient to prove that Diffie-Hellman Key can be used
Eve may recover part of information with some confidence One cannot simply use bits of gab as a shared key
Loose Definition
Stronger than CDH
21
Contributory Provable security Key independence
d is the height of key tree (O(log 2 N)), N is the number of users Maximum number of exponentiation = 4(d-1)
22
23
Intuitive Definition
One member changing its contribution upon every event
24
Avg number of mod exp: 2 log2 n Max number of rounds: log2 n
small number of rounds small number of messages in return for more computation
25
Max 2 rounds Max 2 broadcasts
Contributory Provable security Backward and forward secrecy => key independence Provable security
Max # exponentiations Ζ3(N-1) avg = 3N/2 Low for join/merge
26
1n 2
27
1n 2
28
29
Same as TGDH
mod exp: 2 – join, 1.5n – leave number of rounds: 1 – join, 1 – leave number of messages: 2 – join, 1 – leave
30
Easy 3 2n 2n 2 BD 2k 1 2 3 2 Merge 1.5n 1 1 1
Leave, Partition
Easy 2 1 1 2 1 Join STR log n log n log n log n/2 Partition log n 1 1 1 Leave Easy 2log n 3 3 2 Join, Merge TGDH n+2k 2 n+2k-1 n+2k+1 k+3 Merge n 1 1 1
Leave, Partition
Hard 2n 1 1 2 2 Join Cliques IKA.2 Exp Broad Uni Msgs Rounds Robust Comp Comm
31
STR TGDH CKD BD GDH IKA.1 GDH IKA.2