skip to main content
research-article

Password-Authenticated Group Key Exchange: A Cross-Layer Design

Published:09 December 2016Publication History
Skip Abstract Section

Abstract

Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been made so far to design password-authenticated group key exchange (GPAKE) protocols. In a 2PAKE or GPAKE protocol, it is assumed that short passwords are preshared among users. This assumption, however, would be impractical in certain applications. Motivated by this observation, this article presents a GPAKE protocol without the password sharing assumption. To obtain the passwords, wireless devices, such as smart phones, tablets, and laptops, are used to extract short secrets at the physical layer. Using the extracted secrets, users in our protocol can establish a group key at higher layers with light computation consumptions. Thus, our GPAKE protocol is a cross-layer design. Additionally, our protocol is a compiler, that is, our protocol can transform any provably secure 2PAKE protocol into a GPAKE protocol with only one more round of communications. Besides, the proposed protocol is proved secure in the standard model.

References

  1. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, and Rainer Steinwandt. 2007. (Password) authenticated key establishment: From 2-party to group. In Proceedings of the 4th Theory of Cryptography Conference (TCC’07) (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.), Vol. 4392. Springer, 499--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. 2006. Password-based group key exchange in a constant number of rounds. In Public Key Cryptography - Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC’06) (Lecture Notes in Computer Science), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, and Tal Malkin (Eds.), Vol. 3958. Springer, 427--442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Michel Abdalla, Dario Catalano, Céline Chevalier, and David Pointcheval. 2009. Password-authenticated group key agreement with adaptive security and contributiveness. In Progress in Cryptology - Proceedings of the 2nd International Conference on Cryptology in Africa (AFRICACRYPT’09) (Lecture Notes in Computer Science), Bart Preneel (Ed.), Vol. 5580. Springer, 254--271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Michel Abdalla, Céline Chevalier, Louis Granboulan, and David Pointcheval. 2011. Contributory password-authenticated group key exchange with join capability. In Topics in Cryptology - Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSA’11) (Lecture Notes in Computer Science), Aggelos Kiayias (Ed.), Vol. 6558. Springer, 142--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Michel Abdalla and David Pointcheval. 2006. A scalable password-based group key exchange protocol in the standard model. In Advances in Cryptology - Proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’06) (Lecture Notes in Computer Science), Xuejia Lai and Kefei Chen (Eds.), Vol. 4284. Springer, 332--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mihir Bellare, David Pointcheval, and Phillip Rogaway. 2000. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’00) (Lecture Notes in Computer Science), Bart Preneel (Ed.), Vol. 1807. Springer, 139--155.Google ScholarGoogle ScholarCross RefCross Ref
  7. Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. 2002. Group Diffie-Hellman key exchange secure against dictionary attacks. In Advances in Cryptology - Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’02), (Lecture Notes in Computer Science), Yuliang Zheng (Ed.), Vol. 2501. Springer, 497--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mike Burmester and Yvo Desmedt. 1994. A secure and efficient conference key distribution system (extended abstract). In Advances in Cryptology - Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’94) (Lecture Notes in Computer Science), Alfredo De Santis (Ed.), Vol. 950. Springer, 275--286.Google ScholarGoogle Scholar
  9. Arcangelo Castiglione, Paolo D’Arco, Alfredo De Santis, and Rosario Russo. 2015a. Secure group communication schemes for dynamic heterogeneous distributed computing. In Press. Future Generation Computer Systems (2015).Google ScholarGoogle Scholar
  10. Arcangelo Castiglione, Francesco Palmieri, Ugo Fiore, Aniello Castiglione, and Alfredo De Santis. 2015b. Modeling energy-efficient secure communications in multi-mode wireless mobile devices. Journal of Computer and System Sciences 81, 8 (2015), 1464--1478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Arcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri, and Ugo Fiore. 2013. An energy-aware framework for reliable and secure end-to-end ubiquitous data communications. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 157--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wanchun Dou, Xuyun Zhang, Jianxun Liu, and Jinjun Chen. 2015. HireSome-II: Towards privacy-aware cross-cloud service composition for big data applications. IEEE Transactions on Parallel and Distributed Systems 26, 2 (2015), 455--466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ratna Dutta and Rana Barua. 2006. Password-based encrypted group key agreement. International Journal of Network Security 3, 1 (2006), 23--34.Google ScholarGoogle Scholar
  14. Feng Hao, Xun Yi, Liqun Chen, and Siamak Fayyaz Shahandashti. 2015. The fairy-ring dance: Password authenticated key exchange in a group. IACR Cryptology ePrint Archive 2015 (2015), 80.Google ScholarGoogle Scholar
  15. Daojing He, Chun Chen, Maode Ma, Sammy Chan, and Jiajun Bu. 2013. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems 26, 4 (2013), 495--504.Google ScholarGoogle ScholarCross RefCross Ref
  16. Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha Kumar Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MOBICOM’09), Kang G. Shin, Yongguang Zhang, Rajive Bagrodia, and Ramesh Govindan (Eds.). ACM, 321--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jonathan Katz, Rafail Ostrovsky, and Moti Yung. 2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM 57, 1 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jonathan Katz and Moti Yung. 2003. Scalable protocols for authenticated group key exchange. In Advances in Cryptology - 23rd Annual International Cryptology Conference (CRYPTO’03), (Lecture Notes in Computer Science), Dan Boneh (Ed.), Vol. 2729. Springer, 110--125.Google ScholarGoogle Scholar
  19. Osman Khalid, Samee Ullah Khan, Sajjad Ahmad Madani, Khizar Hayat, Majid Iqbal Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally, and Dan Chen. 2013. Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks 6, 6 (2013), 669--688.Google ScholarGoogle ScholarCross RefCross Ref
  20. Su-Mi Lee, Jung Yeon Hwang, and Dong Hoon Lee. 2004. Efficient password-based group key exchange. In Proceedings of the 1st International Conference on Trust and Privacy in Digital Business (TrustBus’04), (Lecture Notes in Computer Science), Sokratis K. Katsikas, Javier Lopez, and Günther Pernul (Eds.), Vol. 3184. Springer, 191--199.Google ScholarGoogle ScholarCross RefCross Ref
  21. Chang Liu, Chi Yang, Xuyun Zhang, and Jinjun Chen. 2015. External integrity verification for outsourced big data in cloud and IoT: A big picture. Future Generation Computer Systems 49 (2015), 58--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Suhas Mathur, Robert D. Miller, Alexander Varshavsky, Wade Trappe, and Narayan B. Mandayam. 2011. ProxiMate: Proximity-based secure pairing using ambient wireless signals. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys’11), Ashok K. Agrawala, Mark D. Corner, and David Wetherall (Eds.). ACM, 211--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Suhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, and Alex Reznik. 2008. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th Annual International Conference on Mobile Computing and Networking (MOBICOM’08), J. J. Garcia-Luna-Aceves, Raghupathy Sivakumar, and Peter Steenkiste (Eds.). ACM, 128--139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Charith Perera, Rajiv Ranjan, Lizhe Wang, Samee Ullah Khan, and Albert Y. Zomaya. 2015. Big data privacy in the internet of things era. IT Professional 17, 3 (2015), 32--39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Pawani Porambage, An Braeken, Corinna Schmitt, Andrei Gurtov, Mika Ylianttila, and Burkhard Stiller. 2015. Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3 (2015), 1503--1511.Google ScholarGoogle ScholarCross RefCross Ref
  26. Sriram Nandha Premnath, Suman Jana, Jessica Croft, Prarthana Lakshmane Gowda, Mike Clark, Sneha Kumar Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2013. Secret key extraction from wireless signal strength in real environments. IEEE Transaction on Mobile Computing 12, 5 (2013), 917--930. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Deepak Puthal, Surya Nepal, Rajiv Ranjan, and Jinjun Chen. 2016. DLSeF: A dynamic key length based efficient real-time security verification model for big data stream. In Press. ACM Transactions on Embedded Computing Systems (2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Qiang Tang and Kim-Kwang Raymond Choo. 2006. Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks. In Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS’06) (Lecture Notes in Computer Science), Jianying Zhou, Moti Yung, and Feng Bao (Eds.), Vol. 3989. 162--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zhiguo Wan, Robert H. Deng, Feng Bao, and Bart Preneel. 2007. nPAKE+: A hierarchical group password-authenticated key exchange protocol using different passwords. In Proceedings of the 9th International Conference on Information and Communications Security (ICICS’07) (Lecture Notes in Computer Science), Sihan Qing, Hideki Imai, and Guilin Wang (Eds.), Vol. 4861. Springer, 31--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’11). IEEE, 1422--1430.Google ScholarGoogle ScholarCross RefCross Ref
  31. Qian Wang, Kaihe Xu, and Kui Ren. 2012. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on Selected Areas in Communications 30, 9 (2012), 1666--1674.Google ScholarGoogle ScholarCross RefCross Ref
  32. Bing Wu, Jie Wu, and Yuhong Dong. 2009. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 4, 1/2 (2009), 125--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Bin Zan, Marco Gruteser, and Fei Hu. 2013. Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theorems. IEEE Transactions on Vehicular Technology 62, 8 (2013), 4020--4027.Google ScholarGoogle ScholarCross RefCross Ref
  34. Kai Zeng, Daniel Wu, An (Jack) Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’10). IEEE, 1837--1845. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Password-Authenticated Group Key Exchange: A Cross-Layer Design

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Internet Technology
              ACM Transactions on Internet Technology  Volume 16, Issue 4
              Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery
              December 2016
              168 pages
              ISSN:1533-5399
              EISSN:1557-6051
              DOI:10.1145/3023158
              • Editor:
              • Munindar P. Singh
              Issue’s Table of Contents

              Copyright © 2016 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 9 December 2016
              • Accepted: 1 June 2016
              • Revised: 1 April 2016
              • Received: 1 November 2015
              Published in toit Volume 16, Issue 4

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader