Efficient ID-Based One Round Authenticated Group Key Agreement Protocol

被引:0
|
作者
Shi, Yijuan [1 ]
Chen, Gongliang [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect & Engn, Huanshan Rd 1954, Shanghai 200030, Peoples R China
来源
关键词
Group key agreement; Bilinear parings; ID-based cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based authenticated group key agreement has been increasingly researched because of the simplicity of a public key management. Basically, these protocols provide authentication by signatures. Hence they are less efficient for the verification of signatures creates additional computational overhead. In the paper, we propose an efficient authenticated group key agreement protocol by introducing a modified identity-based public key infrastructure with new system setup and key extraction algorithms. Our proposed protocol can be instantiated to a key agreement protocol between domains without additional overhead. Moreover, our protocol requires only one round and is more efficient than all previously known ones since it provides authentication without using signatures.
引用
收藏
页码:167 / 170
页数:4
相关论文
共 50 条
  • [1] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [2] ID-Based one round authenticated group key agreement protocol with bilinear pairings
    Shi, YJ
    Chen, GL
    Li, JH
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 757 - 761
  • [3] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [4] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [5] An ID-based authenticated dynamic group key agreement with optimal round
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2542 - 2554
  • [6] An ID-based authenticated dynamic group key agreement with optimal round
    TENG JiKai1
    2Graduate University of Chinese Academy of Sciences
    3Faculty of Mathematic and Information Science
    [J]. Science China(Information Sciences), 2012, 55 (11) : 2542 - 2554
  • [7] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    [J]. Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [8] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [9] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [10] Round-optimal ID-based dynamic authenticated group key agreement
    Li, Fei
    Xie, Dongqing
    Yan, Jianhua
    Gao, Wei
    Wang, Xu An
    [J]. International Journal of High Performance Systems Architecture, 2016, 6 (03) : 153 - 161