Tackling adaptive corruptions in multicast encryption protocols

22Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.

Abstract

We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversaries who corrupt protocol participants during protocol execution). Our soundness theorem shows that if the encryption scheme used in the protocol is semantically secure, and encryption cycles are absent, then security against adaptive corruptions is achievable via a reduction factor of O(n · (2n)l), with n and l being (respectively) the size and depth of the key graph generated during any protocol execution. Since, in most protocols of practical interest, the depth of key graphs (measured as the longest chain of ciphertexts of the form εk1 (k2), εk2(k3), εk3(k4), ⋯) is much smaller than their size (the total number of keys), this gives us a powerful tool to argue about the adaptive security of such protocols, without resorting to non-standard techniques (like non-committing encryption). We apply our soundness theorem to the security analysis of multicast encryption protocols and show that a variant of the Logical Key Hierarchy (LKH) protocol is adaptively secure (its security being quasi-polynomially related to the security of the underlying encryption scheme). © International Association for Cryptologic Research 2007.

References Powered by Scopus

Broadcast encryption

1113Citations
N/AReaders
Get full text

Secure group communications using key graphs

966Citations
N/AReaders
Get full text

Revocation and tracing schemes for stateless receivers

876Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Adaptive security in broadcast encryption systems (with short ciphertexts)

243Citations
N/AReaders
Get full text

Possibility and impossibility results for encryption and commitment secure under selective opening

176Citations
N/AReaders
Get full text

Standard security does not imply security against selective-opening

62Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Panjwani, S. (2007). Tackling adaptive corruptions in multicast encryption protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4392 LNCS, pp. 21–40). Springer Verlag. https://doi.org/10.1007/978-3-540-70936-7_2

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 24

71%

Researcher 4

12%

Professor / Associate Prof. 3

9%

Lecturer / Post doc 3

9%

Readers' Discipline

Tooltip

Computer Science 29

85%

Physics and Astronomy 2

6%

Mathematics 2

6%

Design 1

3%

Save time finding and organizing research with Mendeley

Sign up for free