Privacy-preserving group discovery with linear complexity

Mark Manulis, Benny Pinkas, Bertram Poettering

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Scopus citations

Abstract

Affiliation-Hiding Authenticated Key Exchange (AH-AKE) protocols enable two distrusting users, being in possession of membership credentials for some group, to establish a secure session key without leaking any information about this group to non-members. In practice, users might be members of several groups, and such protocols must be able to generate session keys between users who have one or more groups in common. Finding efficient solutions for this group discovery problem has been considered an open research problem, inherent to the practical deployment of these protocols. We show how to solve the privacy-preserving group discovery problem with linear computational and communication complexity, namely O(n) complexity where n is the number of groups per user. Our generic solution is based on a new primitive - Index-Hiding Message Encoding (IHME), for which we provide definitions and an unconditionally secure construction. Additionally, we update the syntax and the security model of AH-AKE protocols to allow multiple input groups per participant and session. Furthermore, we design a concrete multi-group AH-AKE protocol by applying IHME to a state-of-the-art single-group scheme.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings
Pages420-437
Number of pages18
DOIs
StatePublished - 2010
Externally publishedYes
Event8th International Conference on Applied Cryptography and Network Security, ACNS 2010 - Beijing, China
Duration: 22 Jun 201025 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6123 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Applied Cryptography and Network Security, ACNS 2010
Country/TerritoryChina
CityBeijing
Period22/06/1025/06/10

Funding

FundersFunder number
Seventh Framework Programme208173, 216499

    Fingerprint

    Dive into the research topics of 'Privacy-preserving group discovery with linear complexity'. Together they form a unique fingerprint.

    Cite this