Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Authors : Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimuţ, David Naccache, Peter B. Rønne, Peter Y. A. Ryan

Published in: Innovative Security Solutions for Information Technology and Communications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We introduce new authenticated key exchange protocols which on one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material which size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
For instance, if the \(\text {ID}_i\)s are identity cards, the attacker needs to collect and compromise enough cards hoping to complete his collection of \(k_i\)s.
 
Literature
3.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS 1993, pp. 62–73. ACM (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS 1993, pp. 62–73. ACM (1993)
6.
go back to reference Eisenberg, B.: On the expectation of the maximum of IID geometric random variables. Stat. Probab. Lett. 78(2), 135–143 (2008)MathSciNetCrossRef Eisenberg, B.: On the expectation of the maximum of IID geometric random variables. Stat. Probab. Lett. 78(2), 135–143 (2008)MathSciNetCrossRef
7.
go back to reference Joye, M., Yen, S.M.: ID-based secret-key cryptography. SIGOPS Oper. Syst. Rev. 32(4), 33–39 (1998)CrossRef Joye, M., Yen, S.M.: ID-based secret-key cryptography. SIGOPS Oper. Syst. Rev. 32(4), 33–39 (1998)CrossRef
8.
go back to reference Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRef Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRef
9.
go back to reference Sharif, M., Hassibi, B.: Delay considerations for opportunistic scheduling in broadcast fading channels. IEEE Trans. Wirel. Commun. 6(9), 3353–3363 (2007)CrossRef Sharif, M., Hassibi, B.: Delay considerations for opportunistic scheduling in broadcast fading channels. IEEE Trans. Wirel. Commun. 6(9), 3353–3363 (2007)CrossRef
Metadata
Title
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Authors
Marc Beunardeau
Fatima-Ezzahra El Orche
Diana Maimuţ
David Naccache
Peter B. Rønne
Peter Y. A. Ryan
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-41025-4_1

Premium Partner