Provably secure constant round contributory group key agreement in dynamic setting

被引:83
|
作者
Dutta, Ratna [1 ]
Barua, Rana [2 ]
机构
[1] Natl Univ Ireland, Dept Comp Sci, Claude Shannon Inst, Maynooth, Kildare, Ireland
[2] Indian Stat Inst, Stat Math Unit, Kolkata 700108, W Bengal, India
关键词
decision Diffie-Hellman (DDH) problem; dynamic membership change; group key agreement; provable security;
D O I
10.1109/TIT.2008.920224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the group at any time during protocol execution with updated keys. In contrast to BD protocol, let us refer to our protocol as DB protocol. Although the DB protocol is similar to BD protocol, there are subtle differences between them: 1) Key computation in DB protocol is different and simpler than in BD protocol with same complexity of BD protocol; 2) Number of rounds required in our authenticated DB protocol is one less than that in authenticated BD protocol introduced by Katz-Yung; 3) DB protocol is more flexible than BD protocol in the sense that DB protocol is dynamic. The reusability of user's precomputed data in previous session enables the join and leave algorithms of our DB protocol to reduce most user's computation complexities which can be useful in real life applications; and 4) DB protocol has the ability to detect the presence of corrupted group members, although one can not detect who among the group members are behaving improperly.
引用
下载
收藏
页码:2007 / 2025
页数:19
相关论文
共 50 条
  • [11] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [12] A secure key agreement protocol for dynamic group
    Bilal, Muhammad
    Kang, Shin-Gak
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2779 - 2792
  • [13] A secure key agreement protocol for dynamic group
    Muhammad Bilal
    Shin-Gak Kang
    Cluster Computing, 2017, 20 : 2779 - 2792
  • [14] A time-efficient contributory key agreement scheme for secure group communications
    Sun, B
    Trappe, W
    Sun, Y
    Liu, KJR
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1159 - 1163
  • [15] Provably secure group key agreement protocol based on ECDH with integrated signature
    Naresh, Vankamamidi S.
    Murthy, Nistala V. E. S.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1085 - 1102
  • [16] Efficient and provably secure password-based group key agreement protocol
    Zheng, Ming-Hui
    Zhou, Hui-Hua
    Li, Jun
    Cui, Guo-Hua
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 948 - 953
  • [17] Constant round group key agreement protocols: A comparative study
    Makri, Eleftheria
    Konstantinou, Elisavet
    COMPUTERS & SECURITY, 2011, 30 (08) : 643 - 678
  • [18] Round-optimal contributory conference key agreement
    Boyd, C
    Nieto, JMG
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 161 - 174
  • [19] 1-round dynamic group key agreement
    Li, Xin
    Zhang, Peng
    Ye, Cheng-Qing
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2007, 41 (12): : 2007 - 2010
  • [20] Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Dong, Zheming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2352 - 2364