Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:2
|
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 50 条
  • [41] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [42] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [43] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [44] Forward Secure Identity-based Key Agreement for Dynamic Groups
    Mailloux, Nick
    Miri, Ali
    Nevins, Monica
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 102 - 111
  • [45] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [46] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [47] Secure identity-based encryption: overcoming the key escrow challenge
    Afroaz, Khaleda
    Rao, Y.V. Subba
    Rekha, N. Rukma
    International Journal of Security and Networks, 2024, 19 (02) : 55 - 62
  • [48] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Deng, Lunzhi
    He, Xiuru
    Xia, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1525 - 1537
  • [49] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [50] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84