Poettering B, Rösler P, Schwenk J, Stebila D (2021)
Publication Type: Conference contribution
Publication year: 2021
Publisher: Springer Science and Business Media Deutschland GmbH
Book Volume: 12704 LNCS
Pages Range: 148-176
Conference Proceedings Title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Event location: Online
ISBN: 9783030755386
DOI: 10.1007/978-3-030-75539-3_7
Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure key material. Many flavors of GKE have been proposed, differentiated by, among others, whether group membership is static or dynamic, whether a single key or a continuous stream of keys is established, and whether security is provided in the presence of state corruptions (forward and post-compromise security). In all cases, an indispensable ingredient to the rigorous analysis of a candidate solution is a corresponding formal security model. We observe, however, that most GKE-related publications are more focused on building new constructions that have more functionality or are more efficient than prior proposals, while leaving the job of identifying and working out the details of adequate security models a subordinate task. In this systematization of knowledge we bring the formal modeling of GKE security to the fore by revisiting the intuitive goals of GKE, critically evaluating how these goals are reflected (or not) in the established models, and how they would be best considered in new models. We classify and compare characteristics of a large selection of game-based GKE models that appear in the academic literature, including those proposed for GKE with post-compromise security. We observe a range of shortcomings in some of the studied models, such as dependencies on overly restrictive syntactical constrains, unrealistic adversarial capabilities, or simply incomplete definitions. Our systematization enables us to identify a coherent suite of desirable characteristics that we believe should be represented in all general purpose GKE models. To demonstrate the feasibility of covering all these desirable characteristics simultaneously in one concise definition, we conclude with proposing a new generic reference model for GKE.
APA:
Poettering, B., Rösler, P., Schwenk, J., & Stebila, D. (2021). SoK: Game-Based Security Models for Group Key Exchange. In Kenneth G. Paterson (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 148-176). Online: Springer Science and Business Media Deutschland GmbH.
MLA:
Poettering, Bertram, et al. "SoK: Game-Based Security Models for Group Key Exchange." Proceedings of the Cryptographer's Track at the RSA Conference, CT-RSA 2021, Online Ed. Kenneth G. Paterson, Springer Science and Business Media Deutschland GmbH, 2021. 148-176.
BibTeX: Download