loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Hiroki Okada 1 ; Shinsaku Kiyomoto 1 and Carlos Cid 2 ; 3

Affiliations: 1 KDDI Research, Inc., Saitama, Japan ; 2 Royal Holloway, University of London, Egham, U.K. ; 3 Simula UiB, Norway

Keyword(s): Group Key Establishment, Post-quantum Cryptography, Isogeny-based Cryptography, SIDH.

Abstract: End-to-end encryption enables secure communication without releasing the contents of messages to the system server. This is a crucial security technology, in particular to cloud services. Group Key Establishment (GKE) protocols are often needed to implement efficient group end-to-end encryption systems. Perhaps the most famous GKE protocol is the Broadcast Protocol, proposed by Burmester and Desmedt. In addition, they also proposed the Star-based Protocol, Tree-based Protocol, and Cyclic-based Protocol. These protocols are based on the Diffie-Hellman key exchange protocol, and therefor are not secure against attacks based on quantum computers. Recently, Furukawa et al. proposed an efficient GKE protocol by modifying the original Broadcast Protocol into a post-quantum GKE protocol based on the Supersingular Isogeny Diffie-Hellman key exchange (SIDH). In this paper, we extend their work by considering the remaining DH-based GKE protocols by Burmester and Desmedt post-quantum versions b ased on SIDH, and compare their efficiency. As a result, we confirm that the Broadcast Protocol is indeed the most efficient protocol in this post-quantum setting, in terms of both communication rounds and computation time. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.129.13.201

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Okada, H.; Kiyomoto, S. and Cid, C. (2021). A Comparison of GKE Protocols based on SIDH. In Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-524-1; ISSN 2184-7711, SciTePress, pages 507-514. DOI: 10.5220/0010547305070514

@conference{secrypt21,
author={Hiroki Okada. and Shinsaku Kiyomoto. and Carlos Cid.},
title={A Comparison of GKE Protocols based on SIDH},
booktitle={Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT},
year={2021},
pages={507-514},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010547305070514},
isbn={978-989-758-524-1},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT
TI - A Comparison of GKE Protocols based on SIDH
SN - 978-989-758-524-1
IS - 2184-7711
AU - Okada, H.
AU - Kiyomoto, S.
AU - Cid, C.
PY - 2021
SP - 507
EP - 514
DO - 10.5220/0010547305070514
PB - SciTePress