[en] We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
Beunardeau, Marc; Nomadic Labs, Paris, France
EL ORCHE, Fatima Ezzahra ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; ENS, CNRS, PSL Research University, Paris, France
Maimut, Diana; Advanced Technologies Institute, Bucharest, Romania
Naccache, David; ENS, CNRS, PSL Research University, Paris, France ; SnT, University of Luxembourg
ROENNE, Peter ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
RYAN, Peter ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Date de publication/diffusion :
14 novembre 2019
Nom de la manifestation :
12th International Conference, SecITC 2019
Lieu de la manifestation :
Bucharest, Roumanie
Date de la manifestation :
November 14-15, 2019
Manifestation à portée :
International
Titre de l'ouvrage principal :
Innovative Security Solutions for Information Technology and Communications