Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 5 . Group key exchange. n parties A 1 , dots, A n want to setup a group secret key that they can use

Problem 5. Group key exchange. n parties A1,dots,An want to setup a group secret key that they
can use for encrypted group messaging. For simplicity, let's assume n is a power of two. They
have at their disposal a public bulletin board (a cloud server) that they can all post messages
to and that will be visible to all of them, as well as to the rest of the world. Our goal here is to
design a group key exchange that is secure against a passive eavesdropper.
a. Let G be a group of prime order q with generator ginG. Let H:GZq be a random hash
function. Your goal is to design a protocol based on two-party (anonymous) Diffie-Hellman
that runs in at most log2n rounds. In each round every party posts at most one group element
in G to the bulletin board and reads at most one group element from the bulletin board.
The parties can only send messages to the bulletin board; no peer-to-peer communication is
allowed. At the end of the protocol, after log2n rounds, all parties obtain the same secret key
and there are at most 2n group elements on the bulletin board. You may assume that the
parties know each other's identities and can order themselves lexicographically by identity.
Hint: think of an n-leaf binary tree where each leaf corresponds to one party.b. Suppose one of the n parties has a malfunctioning random number generator - whenever
that party needs to sample a random number in Zq, its random number generator always
returns 5inZq. Show that this will sink the entire protocol from part (a), even if all the
other participants have well functioning random number generators. Specifically, show that
an eavesdropper will learn the group secret key.
c. Is it possible to design a group key exchange protocol among n parties that is secure against
passive eavesdropping even if at most one of the participants suffers from the problem in
part (b)? Justify your answer.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions