Digital Repository

A Fully Resilient, Identity-based, Efficient, Non-interactive and Decentralized Key Exchange Protocol (FRIEND-KEP)

Show simple item record

dc.contributor.advisor Chatterjee, Sanjit en_US
dc.contributor.author BHATI, AMIT SINGH en_US
dc.date.accessioned 2019-05-20T11:04:32Z
dc.date.available 2019-05-20T11:04:32Z
dc.date.issued 2019-04 en_US
dc.identifier.uri http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/2995
dc.description.abstract A non-interactive key exchange (NIKE) allows two parties to compute a unique shared key without any interaction. Since the innovative work of Diffie and Hellman [10], NIKE has become one of the fundamental problems of modern cryptography. Identity-based NIKE (ID-NIKE) is a fundamental primitive of Identity Based Cryptography. It allows a party to compute a shared key using its own secret key and the other party’s identity. In the recent past, where identity-based encryption and signature have been thoroughly explored, ID-NIKE didn’t get enough attention. At the moment, we have only a few ID-NIKE protocols available (with no fully secure Hierarchical-ID-NIKE (H-ID-NIKE) protocol) in the literature. Mobile Ad-hoc Networks (MANETs) are decentralized networks of mobile devices with limited resources in terms of storage, power, computation, communication, etc. They encounter some serious security issues due to their high mobility and hierarchical structure. H-ID-NIKE can be used to establish shared secret keys in MANETs using minimal resources. Secure H-ID-NIKE protocols are highly appreciated for security-sensitive applications in MANETs such as in military or tactical networks. In particular, key exchange protocols with the four functional properties (as posed by Gennaro et al. in [16]) are considered well-suited for the MANET environment i.e., the protocol should be non-interactive, identity-based, hierarchical and fully resilient against arbitrary number of node compromises at any level. However, the proposed solution for this problem in [16] does not really satisfy all four properties. Their protocol is neither fully resilient nor allows a secure key exchange at any non-leaf level. Later in 2017, Tiwari proposed another H-ID-NIKE construction (named BIOS-SOK) [27] as a possible solution for this problem. BIOS-SOK is a non-interactive, identity-based and hierarchical key exchange protocol which allows multi-level shared key computations. However, it is shown secure under a restricted security model and is not fully resilient in practical scenarios. There are few more constructions available in the literature ([24, 11, 5, 23, 20, 25]) which contain three of these four properties. However, there is no fully secure and practical key exchange protocol with all four properties. In this thesis, we have proposed a key exchange protocol (named α-BSOK) as a possible solution for this open problem. α-BSOK is non-interactive, identity-based, hierarchical, efficient and fully resilient against arbitrary number of node corruptions. α-BSOK is based on the idea of BIOS-SOK hybrid[27]. It is a hybrid of two non-hierarchical protocols BIOS[20] and SOK[25]. Both of these protocols are non-interactive, identity-based and fully resilient. In our work, we have made a hybrid of these protocols which is hierarchical in nature. We have provided a rigorous security analysis for α-BSOK in a stronger security model (compared to [12, 27, 16]). We have discussed two variants of the α-BSOK protocol (named as β-BSOK and β-BSOK-KWT) that slightly traded efficiency for better security. We have also done an implementation and simulation data analysis of α-BSOK with other existing protocols to compare its efficiency. en_US
dc.language.iso en en_US
dc.subject 2019
dc.subject Mathematics en_US
dc.subject Cryptography en_US
dc.subject Theoretical Computer Science en_US
dc.title A Fully Resilient, Identity-based, Efficient, Non-interactive and Decentralized Key Exchange Protocol (FRIEND-KEP) en_US
dc.type Thesis en_US
dc.type.degree BS-MS en_US
dc.contributor.department Interdisciplinary en_US
dc.contributor.registration 20141175 en_US


Files in this item

This item appears in the following Collection(s)

  • MS THESES [1705]
    Thesis submitted to IISER Pune in partial fulfilment of the requirements for the BS-MS Dual Degree Programme/MSc. Programme/MS-Exit Programme

Show simple item record

Search Repository


Advanced Search

Browse

My Account