Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
An Efficient ID-Based Deniable Authentication Protocol from Pairings
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
Efficient Non-interactive Deniable Authentication Protocols
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Multi-Party Computation with Omnipresent Adversary
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Key Agreement from Close Secrets over Unsecured Channels
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Efficient two party and multi party computation against covert adversaries
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Interactive diffie-hellman assumptions with applications to password-based authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A framework for robust group key agreement
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Scalable deniable group key establishment
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
We propose a deniable group key establishment protocol in the standard model. In a deniable group key establishment protocol, the transcript of the protocol session can not be used to prove the involvement of the participant in the protocol session. In other words, the participant can deny that she has joined in the protocol session which she has actually joined in. We figure out that the deniable group key establishment protocol should has the group deniable authentication characteristic, which implies authentication in the protocol execution and deniability after the protocol execution. We give a new definition of the group key establishment deniability in this paper. It is an extension of the definition given by Jens-Matthias Bohli and Rainer Steinwandt. We construct our deniable group key establishment protocol by using a variant of Schnorr’s zero-knowledge identification scheme and Burmester’s group key establishment protocol.