Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent f...
Modern multi-user communication systems, including popular instant messaging tools, social network p...
Abstract. Modern multi-user communication systems, including popular instant messaging tools, social...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
The approach of instantiating authenticated group key exchange (GAKE) protocol from the multikey enc...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakag...
Abstract. We consider one-round key exchange protocols secure in the standard model. The security an...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
Abstract. One-round authenticated key exchange (ORKE) is an es-tablished research area, with many pr...
One-round group authenticated key exchange (GAKE) protocols typically provide implicit authenticatio...
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Ana...
Modern multi-user communication systems, including popular instant messaging tools, social network p...
Abstract. Modern multi-user communication systems, including popular instant messaging tools, social...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
The approach of instantiating authenticated group key exchange (GAKE) protocol from the multikey enc...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakag...
Abstract. We consider one-round key exchange protocols secure in the standard model. The security an...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
Abstract. One-round authenticated key exchange (ORKE) is an es-tablished research area, with many pr...
One-round group authenticated key exchange (GAKE) protocols typically provide implicit authenticatio...
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Ana...
Modern multi-user communication systems, including popular instant messaging tools, social network p...
Abstract. Modern multi-user communication systems, including popular instant messaging tools, social...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...