Forward Secure ID-based Group Key Agreement Protocol with Anonymity

被引:4
|
作者
Park, Hyewon [1 ]
Kim, Zeen [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol KAIST, Dept Informat & Commun Engn, Taejon 305732, South Korea
关键词
D O I
10.1109/SECURWARE.2009.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based group key agreement (GKA) has been increasingly researched with the advantage of simple public key management. However identities of group members can be exposed in the ID-based GKA protocol, so eavesdroppers can easily learn who belongs to the specific group. Recently, Wan et al. [7] proposed a solution for this problem, an anonymous ID-based GKA protocol, which can keep group members' anonymity to outside eavesdroppers; nevertheless, the protocol has some security flaws. This paper shows that Wan et al.'s GKA is insecure against colluding attack and their joining/leaving protocols do not guarantee forward and backward secrecy. We also propose a new forward secure ID-based GKA with anonymity from enhancing Wan et al.'s joining/leaving protocols. Our scheme provides forward and backward secrecy and is essentially just efficient as Wan et al.'s scheme.
引用
收藏
页码:274 / 279
页数:6
相关论文
共 50 条
  • [1] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428
  • [2] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [3] A new ID-based group key agreement protocol for the network
    Xia, Meichen
    He, Mingxing
    Xie, Liyun
    Journal of Computational Information Systems, 2009, 5 (06): : 1855 - 1860
  • [4] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [5] An ID-based conference key agreement protocol for secure network communications
    Chang, CC
    Lin, IC
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2002, 2 : 252 - 256
  • [6] Two provable secure ID-based group Key agreement protocols
    Miao, Fang
    Liang, Jun
    Yoo, Hyeong Seon
    Wei, Wei
    Journal of Computational Information Systems, 2007, 3 (05): : 1887 - 1892
  • [7] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [8] ID-Based key agreement with anonymity for ad hoc networks
    Chien, Hung-Yu
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 333 - 345
  • [9] A flexible ID-based group key agreement protocol with bilinear pairings
    Liang, Jun
    Yoo, Hyeong Seon
    RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 325 - 328
  • [10] ID-based authenticated group key agreement secure against insider attacks
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1828 - 1830