Privacy-preserving group discovery with linear complexity

Mark Manulis, Benny Pinkas, Bertram Poettering

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Scopus citations


Affiliation-Hiding Authenticated Key Exchange (AH-AKE) protocols enable two distrusting users, being in possession of membership credentials for some group, to establish a secure session key without leaking any information about this group to non-members. In practice, users might be members of several groups, and such protocols must be able to generate session keys between users who have one or more groups in common. Finding efficient solutions for this group discovery problem has been considered an open research problem, inherent to the practical deployment of these protocols. We show how to solve the privacy-preserving group discovery problem with linear computational and communication complexity, namely O(n) complexity where n is the number of groups per user. Our generic solution is based on a new primitive - Index-Hiding Message Encoding (IHME), for which we provide definitions and an unconditionally secure construction. Additionally, we update the syntax and the security model of AH-AKE protocols to allow multiple input groups per participant and session. Furthermore, we design a concrete multi-group AH-AKE protocol by applying IHME to a state-of-the-art single-group scheme.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings
Number of pages18
StatePublished - 2010
Externally publishedYes
Event8th International Conference on Applied Cryptography and Network Security, ACNS 2010 - Beijing, China
Duration: 22 Jun 201025 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6123 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference8th International Conference on Applied Cryptography and Network Security, ACNS 2010


Dive into the research topics of 'Privacy-preserving group discovery with linear complexity'. Together they form a unique fingerprint.

Cite this