Paper 2012/618

An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance

Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, and Santos Merino del Pozo

Abstract

This paper introduces a new key establishment scheme aiming at fully collusion-resistant identity-based symmetric-key agreement. In an identity-based pairwise key agreement scheme, a Trusted Third Party (TTP) manages the system and securely provides any node, e.g., Alice or Bob, with private keying materials. Alice can generate a pairwise key with Bob given her own secret keying material and Bob's identity. The full collusion resistance property would ensure that the scheme remains secure even if arbitrarily many devices collude or are compromised. Our scheme, the HIMMO algorithm, relies on two design concepts: Hiding Information and Mixing Modular Operations. Hiding information is related to the Noisy Interpolation Problem; the Mixing Modular Operations problem seems to be a new hard problem. We describe our scheme, the security of its underlying design principles and give order of magnitude estimations for secure configuration parameters. For these parameters, we show that our prototypic implementation of HIMMO on the 8-bit CPU ATmega128L can generate 128-bit keys in less than 7 ms based on an algorithm fitting in 428 B and with secret keying materials of size 656 B.

Note: A more recent version has been uploaded: https://eprint.iacr.org/2014/698

Metadata
Available format(s)
-- withdrawn --
Publication info
Published elsewhere. Unknown status
Keywords
ID-based symmetric-key generationcollusion resistancemixing modular operationsnoisy interpolation problem.
Contact author(s)
oscar garcia @ philips com
History
2014-10-22: withdrawn
2012-11-01: received
See all versions
Short URL
https://ia.cr/2012/618
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.