[HGI-News] HGI-Seminar am Montag, 05.07.2004

hgi-news at lists.ruhr-uni-bochum.de hgi-news at lists.ruhr-uni-bochum.de
Mi Jun 30 14:45:47 CEST 2004



========================================================================

		  	       Mark Manulis
		Lehrstuhl für Netz- und Datensicherheit
			Ruhr-Universität Bochum	 
            	  
       "Pseudonym Generation Scheme for Ad-Hoc Group Communication"


               Montag, 05.07.2004, 13:15 Uhr, IC 4/39,


Abstract

In this presentation we describe the advantages of using iterative
Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication
scenarios. We focus  on the Tree-based Group Diffie-Hellman (TGDH) protocol
suite that consists of group key agreement protocols based on IDH key trees.
Furthermore, we consider  the anonymity of members during group
communication over a public broadcast channel that provides untraceability
of messages. The main goal of the proposed  pseudonym generation scheme is
to allow group members to generate their own pseudonyms that can be linked
to their real identities only by a democratic  decision of some interacting
group members. The real identities are bound to public keys used in the
group key agreement. The pseudonym generation scheme is  an add-on to the
TGDH protocol suite.

Motivation:
Different appliance scenarios can be considered for the ad-hoc group
communication with pseudonyms, e.g. members of directing board of a company
might want  to communicate securely and anonymously, without having to trust
a third party. If at least one of the group members breaches the
communication rules by  broadcasting some misleading information, then other
members might want to reveal her identity. The decision whether such dispute
case has been occured is  democratic since none of group members is obliged
to take part in the revealing process. This is the main difference to
communication scenarios with a  designated group manager that decides when a
dispute case has occured. To achieve such democratic decision, our scheme
supports (k, n)-threshold revocation  method with k being a power of 2.
Another example is a spontaneously organized auction by members with mobile
devices that bid using hidden identities. After  the auction is finished the
identity of the winner should be revealed to the group. In this scenario
members are interested in providing a correct data while  generating
pseudonyms, otherwise a winner would not be able to prove the possession of
his pseudonym.

 

========================================================================

EMAIL-VERTEILER: Wenn Sie Vortragsankündigungen auch in Zukunft per
Email erhalten wollen, können Sie hier
http://www.hgi.ruhr-uni-bochum.de/deutsch/newsletter/
unseren Newsletter abonnieren.

ANFAHRT: Eine Wegbeschreibung zum IC Gebäude der RUB ist hier zu finden:
http://www.crypto.ruhr-uni-bochum.de/contact.html

VORTRÄGE IM SS 2004:
(Abstracts sind hier:
 http://www.crypto.ruhr-uni-bochum.de/ge/seminar/hgi_sose04.html)

 
 19.04.2004, Marc Stevens, ITSC - RUB, 13.00 c.t. IC 4/39,,
 "Arithmetic on Hyperelliptic curves of genus 1 and 2"

 26.04.2004, Jonathan Hammell, COSY - RUB, 13.00 c.t. IC 4/39,
 "Recognition in a Low-Power Environment"

 03.05.2004, Kai Schramm, COSY - RUB, 13.00 c.t. IC 4/39,
 "Internal Collisions in AES"

 17.05 Christian Tobias, JLU Gießen, 13.15 hrs. IC 4/39,
 "Design und Analyse kryptografischer Bausteine auf nicht-abelschen
Gruppen"

 24.05 Jamshid Shokrollahi, Uni Paderborn, 13.15 hrs. IC 4/39,
 "Unifying structures for polynomial and normal bases"

 31.05 no seminar (Holiday: Pfingsmontag)

 7.06 Lars Pontow, COSY Group -RUB, 13:15 hrs. IC 4/39,
 "Elliptic Curve Cryptography as a Case Study for Hardware/Software
Codesign"

 14.06 Kerstin Lemke, COSY Group -RUB, 13.15 hrs. IC 4/39,
 "DPA on n-bit sized Boolean and Arithmetic Operations and its   application
to IDEA, RC6 and the HMAC-Construction"

 16.06 Eike Kiltz, Lehrstuhl Mathematik und Informatik -RUB, 13:30 hrs. NA
1/58 (Friedrich-Sommer Raum)
"Secure Constant Round Multi-Party Computation for Equality, Comparison and
Bits"

 21.06 Howon Kim (ETRI-Korea), COSY Group -RUB, 13.15 hrs. IC 4/39,
"Hyperelliptic Curve Coprocessors on FPGA"

 28.06 Werner Schindler, BSI, 13:15 hrs, IC 4/39 	
"Über die Modellierung und Analyse physikalischer  Zufallszahlengeneratoren"

 5.07 Mark Manulis, NDS Group -RUB, 13:15 hrs. IC 4/39,
 "Pseudonym Generation Scheme for Ad-Hoc Group Communication"

 12.07 TBA

 19.07 TBA

 26.07 TBA



========================================================================

M.Tech. Sandeep Kumar
Chair for Communication Security
Dept. of Electr. Eng. & Information Sciences
Ruhr-University Bochum
44780 Bochum, Germany

URL: www.crypto.rub.de





Mehr Informationen über die Mailingliste Hgi-News-Deutschland