SLIDE 19 An illustrating example
◮ An illustrating example
e1(u1)
u1 Group G
EKe1(e1),{Ke1}Ku1,{Ke1}Ku2 EKe6(e6),{Ke6}Ku2,{Ke6}Ku3 EKe5(e5),{Ke5}Ku1,{Ke5}Ku3 EKe4(e4),{Ke4}Ku3,{Ke4}Ku2 EKe3(e3),{Ke3}Ku2,{Ke3}Ku1 EKe2(e2),{Ke2}Ku3,{Ke2}Ku1 e1(u1) e2(u3) e3(u2) e4(u3) e5(u1) e6(u2)
u3
e1(u1) e2(u3) e3(u2) e4(u3) e5(u1) e6(u2)
u2
e1(u1) e2(u3) e3(u2) e4(u3) e5(u1) e6(u2)
u1
e1(u1) e2(u3) e3(u2) e4(u3) e5(u1) e6(u2)
u4
e1(u1) e2(u3) e3(u2) e4(u3) e5(u1) e6(u2) Inside the group G New user u4 arrives and joins the group G. u4 contacts nearby user u2. u2 sends him the whole encrypted copy of shared calendar stored in persistent storage R R R R R R R R R R R R e1(u1) EKe1(e1),{Ke1}Ku1,{Ke1}Ku2 EKe6(e6),{Ke6}Ku2,{Ke6}Ku3 EKe5(e5),{Ke5}Ku1,{Ke5}Ku3 EKe4(e4),{Ke4}Ku3,{Ke4}Ku2 EKe3(e3),{Ke3}Ku2,{Ke3}Ku1 EKe2(e2),{Ke2}Ku3,{Ke2}Ku1 e1(u1) EKe1(e1),{Ke1}Ku1,{Ke1}Ku2 EKe6(e6),{Ke6}Ku2,{Ke6}Ku3 EKe5(e5),{Ke5}Ku1,{Ke5}Ku3 EKe4(e4),{Ke4}Ku3,{Ke4}Ku2 EKe3(e3),{Ke3}Ku2,{Ke3}Ku1 EKe2(e2),{Ke2}Ku3,{Ke2}Ku1 e1(u1) EKe1(e1),{Ke1}Ku1,{Ke1}Ku2 EKe6(e6),{Ke6}Ku2,{Ke6}Ku3 EKe5(e5),{Ke5}Ku1,{Ke5}Ku3 EKe4(e4),{Ke4}Ku3,{Ke4}Ku2 EKe3(e3),{Ke3}Ku2,{Ke3}Ku1 EKe2(e2),{Ke2}Ku3,{Ke2}Ku1 e1(u1) EKe1(e1),{Ke1}Ku1,{Ke1}Ku2 EKe6(e6),{Ke6}Ku2,{Ke6}Ku3 EKe5(e5),{Ke5}Ku1,{Ke5}Ku3 EKe4(e4),{Ke4}Ku3,{Ke4}Ku2 EKe3(e3),{Ke3}Ku2,{Ke3}Ku1 EKe2(e2),{Ke2}Ku3,{Ke2}Ku1 R R R R
( Ku1 , K-1
u1 )
( Ku2 , K-1
u2 )
( Ku4 , K-1
u4 )
( Ku3 , K-1
u3 )
Ke1 Ke5 Ke3 Ke2 Ke6 Ke4 Ke3 Ke1 Ke1 Ke5 Ke3 Ke2 Ke6 Ke5 Ke4 Ke2
U1 crashes U1 joins the group G again and contacts u3. u3 gives him the whole shared calendar state in persistent storage. u1 retrieves all his shared calenar events back using his private key
( Ku1 , K-1
u1 )
Jagdish Prasad Achara (UHP – Nancy 1) Security Framework for DeSCal 24 juin 2011 19 / 25