Key-reusable dynamic group key exchange from lattice with quantum rsistance양자 내성을 가지는 래티스 문제를 이용한 키 재사용이 가능한 동적 그룹 키 교환 방식의 설계 및 분석

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 264
  • Download : 0
Recently, several key reuse attacks against Ding Key Exchange, NewHope and other lattice-based key exchange schemes using Peikert's key reconciliation mechanism were suggested. But all known key reuse attacks are designed for two-party setting instead of group key exchange. On the other hand, all previous known lattice-based group key exchanges are designed for static setting. This paper is organized in three folds. We present the first key reuse attack called {one, two}-neighbour attack against lattice-based group key exchanges, namely Ding $et$ $al$.'s group key exchange scheme in 2012 and Apon $et$ $al$.'s group key exchange scheme from PQCrypto 2019. We consider that the adversary manipulates {one or two} neighbour parties $P_{N-2}$ (and $P_{N-3}$ for two-neighbour attack) of the last party $P_{N-1}$ to recover the secret key of the last party $P_{N-1}$ among $N$ parties. We also suggest several constructions of dynamic group key exchange protocols that could be instantiated by lattice. As a countermeasure of our attack, we design the first key-reusable group key exchange based on {lattice}. where GKE protocol $\Pi_\textsf{GKE}$ is {key-reusable} if the protocol participants of $\Pi_\textsf{GKE}$ can re-use their public key. By adopting existing pasteurization technique for two-party key exchange from lattice, our protocol becomes resistant to known key reuse attacks. We give a rigorous proof of our protocol in the random oracle model. Our underlying dynamic group key exchange protocol is the modification of Dutta-Barua protocol in RLWE setting.
Advisors
Kim, Kwangjoresearcher김광조researcher
Description
한국과학기술원 :전산학부,
Publisher
한국과학기술원
Issue Date
2020
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전산학부, 2020.8,[v, 83 p. :]

Keywords

key exchange protocol▼adynamic group key exchange▼alattice-based cryptography▼apost-quantum cryptography▼akey-reuse attack; 키 교환 프로토콜▼a동적 그룹 키 교환▼a격자 기반 암호▼a양자 내성 암호▼a키 재사용 공격

URI
http://hdl.handle.net/10203/284374
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=924413&flag=dissertation
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0