Abstract

AbstractGroup key exchange (GKE) protocols get much attention in current research with increasing applicability in numerous group-oriented and collaborative applications. In this paper, we propose three schemes on supersingular isogenies. They all have two rounds. Two of them are optimizations of Burmester and Desmedt’s protocols without authentication. Our methods are more efficient in the view of communication and computation time. Another one is a provably secure constant round post-quantum authenticated group key exchange (AGKE) protocol, which is built from the first GKE protocol. This proposed scheme achieves security following the security notion namely the eGBG model which considers forward secrecy, KCI resilience and the leakage of ephemeral keys. We give formal proofs for its AKE security, mutual authentication and contributiveness. We also give a comparison of these existing GKE and AGKE protocols. KeywordsSupersingular isogenyPost QuantumGroup key exchangeAuthenticated group key exchange

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.