Title of article
Parallel Key Exchange
Author/Authors
Jeong, Ik Rae Korea University - Graduate School of Information Security CIST, Korea , Lee, Dong Hoon Korea University - Graduate School of Information Security CIST, Korea
From page
377
To page
396
Abstract
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various se- curity notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the multiple keys corresponding to all edges of a key graph in a single session. The security of our protocol is proven in the standard model.
Keywords
key exchange , key graph , security notions , randomness re , use Category: C.2.0 , E.3
Journal title
Journal of J.UCS (Journal of Universal Computer Science)
Journal title
Journal of J.UCS (Journal of Universal Computer Science)
Record number
2661019
Link To Document