Paper 2022/1237
On the Worst-Case Inefficiency of CGKA
Abstract
Continuous Group Key Agreement (CGKA) is the basis of modern Secure Group Messaging (SGM) protocols. At a high level, a CGKA protocol enables a group of users to continuously compute a shared (evolving) secret while members of the group add new members, remove other existing members, and perform state updates. The state updates allow CGKA to offer desirable security features such as forward secrecy and post-compromise security.
CGKA is regarded as a practical primitive in the real-world. Indeed, there is an IETF Messaging Layer Security (MLS) working group devoted to developing a standard for SGM protocols, including the CGKA protocol at their core. Though known CGKA protocols seem to perform relatively well when considering natural sequences of performed group operations, there are no formal guarantees on their efficiency, other than the
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published by the IACR in TCC 2022
- Keywords
- Continuous Group Key Agreement Secure Group Messaging Black-Box separation Lower Bound Post-Compromise Security
- Contact author(s)
-
abienstock @ cs nyu edu
dodis @ cs nyu edu
sanjamg @ berkeley edu
garrisonwgrogan @ gmail com
mdhajiabadi @ uwaterloo ca
paul roesler @ cs nyu edu - History
- 2022-09-19: approved
- 2022-09-18: received
- See all versions
- Short URL
- https://ia.cr/2022/1237
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1237, author = {Alexander Bienstock and Yevgeniy Dodis and Sanjam Garg and Garrison Grogan and Mohammad Hajiabadi and Paul Rösler}, title = {On the Worst-Case Inefficiency of {CGKA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1237}, year = {2022}, url = {https://eprint.iacr.org/2022/1237} }