Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

被引:52
|
作者
Zhang, Lei [1 ,2 ]
Wu, Qianhong [2 ,3 ]
Qin, Bo [2 ,4 ]
Domingo-Ferrer, Josep [2 ]
机构
[1] E China Normal Univ, Inst Software Engn, Shanghai 200062, Peoples R China
[2] Univ Rovira & Virgili, Dept Comp Engn & Math, Tarragona, Catalonia, Spain
[3] Wuhan Univ, Sch Comp, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan, Peoples R China
[4] Xian Univ Technol, Sch Sci, Dept Maths, Xian, Peoples R China
关键词
Identity-based public key cryptography; Group key agreement; Asymmetric group key agreement; Bilinear map; EXCHANGE; ENCRYPTION;
D O I
10.1016/j.ins.2011.05.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The newly introduced notion of asymmetric group key agreement (AGKA) enables external users to securely send messages to group members. The existing AGKA is only secure against passive attacks which are too weak to capture the attacks in the real world. In this paper, we formalize an active security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA). We then present an efficient identity-based batch multi-signature, from which we construct an IB-AAGKA protocol. Our protocol is proven secure under the Bilinear Diffie-Hellman Exponent (BDHE) assumption. The active security feature implies that the protocol can withstand more realistic attacks. The identity-based feature eliminates the need of certificates and solves the certificate management problem in traditional public-key cryptosystems. Finally, an effective trade-off is provided to balance the protocol transcript size and the ciphertext size. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:4318 / 4329
页数:12
相关论文
共 50 条
  • [1] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [2] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    [J]. Wireless Personal Communications, 2015, 85 : 879 - 898
  • [3] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [4] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [5] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [6] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    [J]. UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416
  • [7] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [8] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    [J]. Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337
  • [9] An authenticated 3-round identity-based group key agreement protocol
    Yao, Gang
    Wang, Hongji
    Jiang, Qingshan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 538 - +
  • [10] Identity-based authenticated asymmetric group key agreement
    [J]. Tan, Yu'an, 1727, Science Press (51):