Title of article :
Parallel Key Exchange
Author/Authors :
Jeong, Ik Rae Korea University - Graduate School of Information Security CIST, Korea , Lee, Dong Hoon Korea University - Graduate School of Information Security CIST, Korea
From page :
377
To page :
396
Abstract :
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various se- curity notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the multiple keys corresponding to all edges of a key graph in a single session. The security of our protocol is proven in the standard model.
Keywords :
key exchange , key graph , security notions , randomness re , use Category: C.2.0 , E.3
Journal title :
Journal of J.UCS (Journal of Universal Computer Science)
Journal title :
Journal of J.UCS (Journal of Universal Computer Science)
Record number :
2661019
Link To Document :
بازگشت