Zenodo.org will be unavailable for 2 hours on September 29th from 06:00-08:00 UTC. See announcement.

Conference paper Open Access

Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Beunardeau, M.; Orche, F.; Maimuţ, D.; Naccache, D.; Rønne, P.; Ryan, P.

We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.

Files (575.0 kB)
Name Size
35-Authenticated-Key-Distribution.pdf
md5:f55b4883c6407240111645f9442755a1
575.0 kB Download
86
62
views
downloads
All versions This version
Views 8686
Downloads 6262
Data volume 35.6 MB35.6 MB
Unique views 8282
Unique downloads 5656

Share

Cite as