A strongly secure identity-based authenticated group key exchange protocol

被引:0
|
作者
TENG JiKai [1 ]
WU ChuanKun [1 ]
TANG ChunMing [2 ]
TIAN YouLiang [1 ]
机构
[1] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
[2] School of Mathematics and Information Science, Guangzhou University
基金
中国国家自然科学基金;
关键词
identity-based cryptography; group key exchange; provable security; insider security;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In group key exchange(GKE) protocols, a shared secret key is established among a group of members for cryptographic use over a public network. An identity-based protocol is preferred to that under the employment of traditional public key infrastructure(PKI), since identity-based cryptosystem can simplify public key management procedure. In ASIACCS 2011, a security model for GKE protocol called EGBG model was proposed. The EGBG model takes ephemeral secret key leakage attack into consideration. Until now, there is no ID-based GKE protocol secure in the EGBG model. In this paper, we propose an identity-based GKE protocol. Its AKE-security with KCIR and full forward secrecy, MA-security with KCIR and its contributiveness are proven in the EGBG model. The proposed protocol does not involve NAXOS trick, which does not resist side channel attack and thus it provides stronger security guarantee. It achieves mutual authentication without applying signature, which makes the protocol more practical.
引用
收藏
页码:98 / 109
页数:12
相关论文
共 50 条
  • [1] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [2] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    [J]. China Communications, 2007, 4 (04) : 11 - 22
  • [3] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    [J]. CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [4] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [5] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290
  • [6] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [7] A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication
    Zhong Yantao
    Ma Jianfeng
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2010, 12 (06) : 592 - 599
  • [8] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198
  • [9] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    [J]. ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [10] Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
    Lian, Huanhuan
    Kang, Burong
    Yang, Libao
    [J]. IEEE ACCESS, 2024, 12 : 98611 - 98622