Question: Problem 5 . Group key exchange. n parties A 1 , dots, A n want to setup a group secret key that they can use
Problem Group key exchange. parties dots, want to setup a group secret key that they
can use for encrypted group messaging. For simplicity, let's assume is a power of two. They
have at their disposal a public bulletin board a cloud server that they can all post messages
to and that will be visible to all of them, as well as to the rest of the world. Our goal here is to
design a group key exchange that is secure against a passive eavesdropper.
a Let be a group of prime order with generator ginG. Let : be a random hash
function. Your goal is to design a protocol based on twoparty anonymous DiffieHellman
that runs in at most rounds. In each round every party posts at most one group element
in to the bulletin board and reads at most one group element from the bulletin board.
The parties can only send messages to the bulletin board; no peertopeer communication is
allowed. At the end of the protocol, after rounds, all parties obtain the same secret key
and there are at most group elements on the bulletin board. You may assume that the
parties know each other's identities and can order themselves lexicographically by identity.
Hint: think of an leaf binary tree where each leaf corresponds to one party.b Suppose one of the parties has a malfunctioning random number generator whenever
that party needs to sample a random number in its random number generator always
returns Show that this will sink the entire protocol from part a even if all the
other participants have well functioning random number generators. Specifically, show that
an eavesdropper will learn the group secret key.
c Is it possible to design a group key exchange protocol among parties that is secure against
passive eavesdropping even if at most one of the participants suffers from the problem in
part b Justify your answer.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
