Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Loading...
Date
2013
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electronics, Information and Communication, Engineers, IEICE
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
We propose a security model, referred as g-eCK model, for group key exchange that captures essentially all non-trivial leakage of static and ephemeral secret keys of participants, i.e., group key exchange version of extended Canetti-Krawczyk (eCK) model. Moreover, we propose the first one-round tripartite key exchange (3KE) protocol secure in the g-eCK model under the gap Bilinear Diffie-Hellman (gap BDH) assumption and in the random oracle model.
Description
Manulis, Mark/0000-0002-1512-9670; Ustaoglu, Berkant/0000-0002-0411-9389
Keywords
Gap Bilinear Diffie-Hellman Assumption, Group Key Exchange, Group-Oriented Extended Canetti-Krawczyk Model, Random Oracle Model, Tripartite Key Exchange, Group key exchange, Communication rounds, Cryptography, Network protocols, Provably secure
Fields of Science
0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
WoS Q
Q4
Scopus Q
Q4

OpenCitations Citation Count
4
Source
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Volume
E96-A
Issue
1
Start Page
101
End Page
110
PlumX Metrics
Citations
CrossRef : 4
Scopus : 7
Patent Family : 1
Captures
Mendeley Readers : 13
SCOPUS™ Citations
7
checked on Apr 27, 2026
Web of Science™ Citations
5
checked on Apr 27, 2026
Page Views
58
checked on Apr 27, 2026
Downloads
3
checked on Apr 27, 2026
Google Scholar™


