The 7th Central European Conference on Cryptology
June 22-24, 2007, Smolenice, Slovakia
Abstract of a plenary talk
Group Key Establishment: Some Security Goals and Constructions
Center for Cryptology and Information Security
The talk discusses security requirements for group key establishment schemes.
A main focus is on issues related to (password-based) authentication or
malicious insiders. In particular, an example of a protocol compiler is
discussed, that tries to facilitate the modular design of (password-)authenticated
group key key establishment schemes:
Given a (password-)authenticated two-party solution, the described construction
enables the derivation of a (password-)authenticated n-party solution.
The discussed compiler builds on a common reference string and adds two more rounds
of communication to the two-party solution.
No random oracle or ideal cipher assumption is needed.
Mathematical Sciences Dept.
Florida Atlantic University
777 Glades Rd.
Boca Raton, FL 33431
(Based on joint work with Michel Abdalla, Jens-Matthias Bohli and María Isabel González Vasco.)
Last updated on February 12, 2007.