A strongly secure identity-based authenticated group key exchange protocol
被引:0
|
作者:
TENG JiKai
论文数: 0引用数: 0
h-index: 0
机构:
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of SciencesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
TENG JiKai
[1
]
WU ChuanKun
论文数: 0引用数: 0
h-index: 0
机构:
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of SciencesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
WU ChuanKun
[1
]
TANG ChunMing
论文数: 0引用数: 0
h-index: 0
机构:
School of Mathematics and Information Science, Guangzhou UniversityState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
TANG ChunMing
[2
]
TIAN YouLiang
论文数: 0引用数: 0
h-index: 0
机构:
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of SciencesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
TIAN YouLiang
[1
]
机构:
[1] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
[2] School of Mathematics and Information Science, Guangzhou University
identity-based cryptography;
group key exchange;
provable security;
insider security;
D O I:
暂无
中图分类号:
TN918.4 [密码的加密与解密];
学科分类号:
0839 ;
1402 ;
摘要:
In group key exchange(GKE) protocols, a shared secret key is established among a group of members for cryptographic use over a public network. An identity-based protocol is preferred to that under the employment of traditional public key infrastructure(PKI), since identity-based cryptosystem can simplify public key management procedure. In ASIACCS 2011, a security model for GKE protocol called EGBG model was proposed. The EGBG model takes ephemeral secret key leakage attack into consideration. Until now, there is no ID-based GKE protocol secure in the EGBG model. In this paper, we propose an identity-based GKE protocol. Its AKE-security with KCIR and full forward secrecy, MA-security with KCIR and its contributiveness are proven in the EGBG model. The proposed protocol does not involve NAXOS trick, which does not resist side channel attack and thus it provides stronger security guarantee. It achieves mutual authentication without applying signature, which makes the protocol more practical.
机构:
Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R ChinaWuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
Chen, Yitao
Han, Weiwei
论文数: 0引用数: 0
h-index: 0
机构:
Guangdong Univ Business Studies, Dept Math & Comp Sci, Guangzhou, Guangdong, Peoples R ChinaWuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China