Provably secure constant round contributory group key agreement in dynamic setting

被引:83
|
作者
Dutta, Ratna [1 ]
Barua, Rana [2 ]
机构
[1] Natl Univ Ireland, Dept Comp Sci, Claude Shannon Inst, Maynooth, Kildare, Ireland
[2] Indian Stat Inst, Stat Math Unit, Kolkata 700108, W Bengal, India
关键词
decision Diffie-Hellman (DDH) problem; dynamic membership change; group key agreement; provable security;
D O I
10.1109/TIT.2008.920224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the group at any time during protocol execution with updated keys. In contrast to BD protocol, let us refer to our protocol as DB protocol. Although the DB protocol is similar to BD protocol, there are subtle differences between them: 1) Key computation in DB protocol is different and simpler than in BD protocol with same complexity of BD protocol; 2) Number of rounds required in our authenticated DB protocol is one less than that in authenticated BD protocol introduced by Katz-Yung; 3) DB protocol is more flexible than BD protocol in the sense that DB protocol is dynamic. The reusability of user's precomputed data in previous session enables the join and leave algorithms of our DB protocol to reduce most user's computation complexities which can be useful in real life applications; and 4) DB protocol has the ability to detect the presence of corrupted group members, although one can not detect who among the group members are behaving improperly.
引用
收藏
页码:2007 / 2025
页数:19
相关论文
共 50 条
  • [1] Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting"
    Tan, Chik-How
    Yang, Guomin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) : 5887 - 5888
  • [2] Security analysis of provably secure constant round dynamic group key agreement
    Teo, Joseph Chee Ming
    Tan, Chik How
    Ng, Jim Mee
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (11) : 3348 - 3350
  • [3] Constant round dynamic group key agreement
    Dutta, R
    Barua, R
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 74 - 88
  • [4] Constant-round contributory group key agreement for ad hoc networks
    Zhang, P
    Ye, CQ
    Li, X
    Cheng, YH
    Ma, XY
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1199 - 1202
  • [5] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [6] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    [J]. Wireless Personal Communications, 2015, 85 : 879 - 898
  • [7] Secure group communication using robust contributory key agreement
    Amir, Y
    Kim, Y
    Nita-Rotaru, C
    Schultz, JL
    Stanton, J
    Tsudik, G
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (05) : 468 - 480
  • [8] Towards provably secure group key agreement building on group theory
    Bohli, Jens-Matthias
    Glas, Benjamin
    Steinwandt, Rainer
    [J]. PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 322 - +
  • [9] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [10] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329