Arbitrated multiparty protocol

Assume that several people wish to have a meeting. For this to happen, they usually have to meet somewhere. If they cannot meet physically, then they can take part in a video (or audio) conference to discuss whatever needs to be discussed. But what if their meeting is meant to be private? In this case they need a cryptographic protocol that allows them to exchange their ideas remotely, while keeping them secure from any potential eavesdropper. In this paper we list all the necessary requirements that a cryptographic protocol must have in order to allow several persons to exchange their ideas securely over the Internet. Moreover, and based on the standard taxonomy of cryptographic protocols, we suggest several approaches on how to design cryptographic protocols that enable us to achieve our aim. Finally, we propose the design of a protocol that solves our problem.

[1]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[2]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[3]  Laura Giordano,et al.  Verifying Agents' Conformance with Multiparty Protocols , 2009, CLIMA.

[4]  B. Clifford Neuman,et al.  A note on the use of timestamps as nonces , 1993, OPSR.

[5]  Ueli Maurer Secure multi-party computation made simple , 2006, Discret. Appl. Math..

[6]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[7]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[8]  Moni Naor,et al.  Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.

[9]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[10]  John A. Clark,et al.  A survey of authentication protocol literature: Version 1.0 , 1997 .

[11]  Simon S. Lam,et al.  A lesson on authentication protocol design , 1994, OPSR.

[12]  Oded Goldreich,et al.  Cryptography and cryptographic protocols , 2003, Distributed Computing.

[13]  C. Boyd,et al.  Methodical use of cryptographic transformations in authentication protocols , 1995 .

[14]  Hugo Krawczyk,et al.  A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.

[15]  Simon S. Lam,et al.  Authentification for Distributed Systems , 1992, Computer.

[16]  Adam D. Smith,et al.  Efficient Two Party and Multi Party Computation Against Covert Adversaries , 2008, EUROCRYPT.

[17]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[20]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[21]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.

[22]  Peter Honeyman,et al.  Formal Methods for the Analysis of Authentication Protocols , 1993 .

[23]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[24]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[25]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[26]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[27]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[28]  Ran Canetti,et al.  Security and composition of cryptographic protocols: a tutorial (part I) , 2006, SIGA.