Two Level Authenticated Group Key Agreement Protocol with Privacy-Preservation for Resource-Limited Mobile Devices

被引:0
|
作者
Chang, Liang-Peng [1 ]
Wu, Tzong-Chen [1 ]
Hsu, Chien-Lung
Lu, Chung-Fu [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[2] Taipei Coll Maritime Technol, Dept Comp & Commun Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2010年 / 11卷 / 04期
关键词
Privacy; Group key agreement; Mobile; ECC; Self-certified; ANONYMITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a two level ECC-based group key agreement scheme with privacy-preservation, where a group manager can easily setup a secure protocol in a public network to let the intended group members share an authenticated session key without disclosing their identities in the subsequent communication. To protect privacy, the proposed scheme provides the property of user anonymity, an adversary can not intercept the information of intended group member's identity and use it to launch some attacks. By using self-certified public keys and based on the elliptic curve cryptosystems (ECC), the proposed scheme not only satisfies the security requirements of perfect forward secrecy, known key security (resistance to known key attacks), implicit key authentication, and key confirmation (explicit key authentication), but also achieves performance efficiency in practices. The proposed protocol can gain much efficiency in saving both the communicational cost and the computational effort as compared to previous works implemented by modular exponentiation, so it is quite suitable to be used for resource-limited mobile devices in mobile internet.
引用
收藏
页码:519 / 528
页数:10
相关论文
共 39 条
  • [1] CERTIFICATELESS AUTHENTICATED GROUP KEY AGREEMENT SCHEME WITH PRIVACY-PRESERVATION FOR RESOURCE-LIMITED MOBILE DEVICES
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Hsu, Chen-Lung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 599 - 615
  • [2] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    [J]. COMPUTER JOURNAL, 2007, 50 (01): : 41 - 52
  • [3] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    [J]. Computer Journal, 2007, 50 (01): : 41 - 52
  • [4] An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications
    Li, Chun-Ta
    Weng, Chi-Yao
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    Imoize, Agbotiname Lucky
    [J]. SENSORS, 2022, 22 (23)
  • [5] An efficient authenticated key agreement scheme supporting privacy-preservation for smart grid communication
    Xiang, Xinyin
    Cao, Jin
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2022, 203
  • [6] A provable authenticated group key agreement protocol for mobile environment
    Sun, Hung-Min
    He, Bing-Zhe
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Lin, Chia-Hsien
    Wang, Huaxiong
    [J]. INFORMATION SCIENCES, 2015, 321 : 224 - 237
  • [8] A novel authenticated group key agreement protocol for mobile environment
    Jia-Lun Tsai
    [J]. annals of telecommunications - annales des télécommunications, 2011, 66 : 663 - 669
  • [9] Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices
    Chien, Hung-Yu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2177 - 2188
  • [10] On The Logical Verification of a Group Key Agreement Protocol for Resource Constrained Mobile Devices
    Li, Yue
    Newe, Thomas
    [J]. 2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 98 - 102