Attribute-Based Authentication in Secure Group Messaging for Distributed Environments (2405.12042v2)
Abstract: Messaging Layer security (MLS) and its underlying Continuous Group Key Agreement (CGKA) protocol allows a group of users to share a cryptographic secret in a dynamic manner, such that the secret is modified in member insertions and deletions. Although this flexibility makes MLS ideal for implementations in distributed environments, a number of issues need to be overcome. Particularly, the use of digital certificates for authentication in a group goes against the group members' privacy. In this work we provide an alternative method of authentication in which the solicitors, instead of revealing their identity, only need to prove possession of certain attributes, dynamically defined by the group, to become a member. Instead of digital certificates, we employ Attribute-Based Credentials accompanied with Selective Disclosure in order to reveal the minimum required amount of information and to prevent attackers from linking the activity of a user through multiple groups. We formally define a CGKA variant named Attribute-Authenticated Continuous Group Key Agreement (AA-CGKA) and provide security proofs for its properties of Requirement Integrity, Unforgeability and Unlinkability. We also provide guidelines for an integration of our construction in MLS.
- R. Barnes, B. Beurdouche, R. Robert, J. Millican, E. Omara, and K. Cohn-Gordon, “The Messaging Layer Security (MLS) Protocol,” Internet Engineering Task Force, Request for Comments RFC 9420, Jul. 2023, num Pages: 132.
- J. Alwen, B. Auerbach, M. C. Noval, K. Klein, G. Pascual-Perez, and K. Pietrzak, “Decaf: Decentralizable continuous group key agreement with fast healing,” Cryptology ePrint Archive, Paper 2022/559, 2022.
- M. Weidner, M. Kleppmann, D. Hugenroth, and A. R. Beresford, “Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees,” in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Virtual Event Republic of Korea: ACM, Nov. 2021, pp. 2024–2045.
- J. Alwen, M. Mularczyk, and Y. Tselekounis, “Fork-Resilient Continuous Group Key Agreement,” in Advances in Cryptology – CRYPTO 2023, H. Handschuh and A. Lysyanskaya, Eds. Cham: Springer Nature Switzerland, 2023, vol. 14084, pp. 396–429, series Title: Lecture Notes in Computer Science.
- G. Cohen, T. T. Jr, I. Herman, M. Sporny, and M. Jones, “Verifiable credentials data model v2.0,” W3C, Candidate Recommendation, Feb. 2024, https://www.w3.org/TR/2024/CRD-vc-data-model-2.0-20240207/.
- R. Soltani, U. T. Nguyen, and A. An, “A survey of self-sovereign identity ecosystem,” Security and Communication Networks, vol. 2021, pp. 1–26, 2021.
- M. Sporny, G. Noble, D. Burnett, B. Zundel, D. Longley, and K. D. Hartog, “Verifiable credentials data model v1.1,” W3C, W3C Recommendation, Mar. 2022, https://www.w3.org/TR/2022/REC-vc-data-model-20220303/.
- J. Alwen, S. Coretti, Y. Dodis, and Y. Tselekounis, “Security Analysis and Improvements for the IETF MLS Standard for Group Messaging,” in Advances in Cryptology – CRYPTO 2020, D. Micciancio and T. Ristenpart, Eds. Cham: Springer International Publishing, 2020, vol. 12170, pp. 248–277, series Title: Lecture Notes in Computer Science.
- J. Alwen, D. Jost, and M. Mularczyk, “On the Insider Security of MLS,” in Advances in Cryptology – CRYPTO 2022, Y. Dodis and T. Shrimpton, Eds. Cham: Springer Nature Switzerland, 2022, vol. 13508, pp. 34–68, series Title: Lecture Notes in Computer Science.
- A. Bienstock, Y. Dodis, and P. Rösler, “On the Price of Concurrency in Group Ratcheting Protocols,” in Theory of Cryptography, R. Pass and K. Pietrzak, Eds. Cham: Springer International Publishing, 2020, vol. 12551, pp. 198–228, series Title: Lecture Notes in Computer Science.
- K. Cohn-Gordon, C. Cremers, L. Garratt, J. Millican, and K. Milner, “On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto Canada: ACM, Oct. 2018, pp. 1802–1819.
- K. Bhargavan, R. Barnes, and E. Rescorla, “TreeKEM: Asynchronous Decentralized Key Management for Large Dynamic Groups,” ., 2018.
- K. Klein, G. Pascual-Perez, M. Walter, C. Kamath, M. Capretto, M. Cueto, I. Markov, M. Yeo, J. Alwen, and K. Pietrzak, “Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement,” in 2021 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA: IEEE, May 2021, pp. 268–284.
- J. Alwen, D. Hartmann, E. Kiltz, and M. Mularczyk, “Server-Aided Continuous Group Key Agreement,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Los Angeles CA USA: ACM, Nov. 2022, pp. 69–82.
- K. Hashimoto, S. Katsumata, E. Postlethwaite, T. Prest, and B. Westerbaan, “A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs,” in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Virtual Event Republic of Korea: ACM, Nov. 2021, pp. 1441–1462.
- J. Alwen, B. Auerbach, M. C. Noval, K. Klein, G. Pascual-Perez, K. Pietrzak, and M. Walter, “CoCoA: Concurrent Continuous Group Key Agreement,” in Advances in Cryptology – EUROCRYPT 2022, O. Dunkelman and S. Dziembowski, Eds. Cham: Springer International Publishing, 2022, vol. 13276, pp. 815–844, series Title: Lecture Notes in Computer Science.
- D. Balbás, D. Collins, and S. Vaudenay, “Cryptographic administration for secure group messaging,” Cryptology ePrint Archive, Paper 2022/1411, 2022.
- K. Emura, K. Kajita, R. Nojima, K. Ogawa, and G. Ohtake, “Membership Privacy for Asynchronous Group Messaging,” in Information Security Applications, I. You and T.-Y. Youn, Eds. Cham: Springer Nature Switzerland, 2023, vol. 13720, pp. 131–142, series Title: Lecture Notes in Computer Science.
- R. Barnes and S. Nandakumar, “Additional MLS Credentials,” Internet Engineering Task Force, Internet Draft draft-barnes-mls-addl-creds-00, Jul. 2023, num Pages: 12.
- R. Barnes, B. Beurdouche, R. Robert, J. Millican, E. Omara, and K. Cohn-Gordon, “Hybrid Public Key Encryption,” Internet Engineering Task Force, Request for Comments RFC 9180, Jul. 2023, num Pages: 132.
- J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding Attribute-Based Credentials,” in Cryptology and Network Security, M. Conti, M. Stevens, and S. Krenn, Eds. Cham: Springer International Publishing, 2021, vol. 13099, pp. 158–178, series Title: Lecture Notes in Computer Science.
- J. Camenisch, M. Dubovitskaya, K. Haralambiev, and M. Kohlweiss, “Composable and modular anonymous credentials: Definitions and practical constructions,” in Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29–December 3, 2015, Proceedings, Part II 21. Springer, 2015, pp. 262–288.
- E. Bangerter, J. Camenisch, and A. Lysyanskaya, “A cryptographic framework for the controlled release of certified data,” in Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers 12. Springer, 2006, pp. 20–42.
- J. Camenisch and A. Lysyanskaya, “Signature Schemes and Anonymous Credentials from Bilinear Maps,” in Advances in Cryptology – CRYPTO 2004, D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, and M. Franklin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, vol. 3152, pp. 56–72, series Title: Lecture Notes in Computer Science.
- T. Looker, V. Kalos, A. Whitehead, and M. Lodder, “The BBS Signature Scheme,” Internet Engineering Task Force, Internet Draft draft-irtf-cfrg-bbs-signatures-05, Dec. 2023, num Pages: 115.
- J. Brendel, C. Cremers, D. Jackson, and M. Zhao, “The provable security of ed25519: theory and practice,” in 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021, pp. 1659–1676.
- Cisco, “Mls++,” https://github.com/cisco/mlspp, 2024.
- PhoenixR&D, “Openmls,” https://github.com/openmls/openmls, 2024.