Forward Secure ID-based Group Key Agreement Protocol with Anonymity

被引:4
|
作者
Park, Hyewon [1 ]
Kim, Zeen [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol KAIST, Dept Informat & Commun Engn, Taejon 305732, South Korea
关键词
D O I
10.1109/SECURWARE.2009.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based group key agreement (GKA) has been increasingly researched with the advantage of simple public key management. However identities of group members can be exposed in the ID-based GKA protocol, so eavesdroppers can easily learn who belongs to the specific group. Recently, Wan et al. [7] proposed a solution for this problem, an anonymous ID-based GKA protocol, which can keep group members' anonymity to outside eavesdroppers; nevertheless, the protocol has some security flaws. This paper shows that Wan et al.'s GKA is insecure against colluding attack and their joining/leaving protocols do not guarantee forward and backward secrecy. We also propose a new forward secure ID-based GKA with anonymity from enhancing Wan et al.'s joining/leaving protocols. Our scheme provides forward and backward secrecy and is essentially just efficient as Wan et al.'s scheme.
引用
收藏
页码:274 / 279
页数:6
相关论文
共 50 条
  • [21] Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2638 - 2640
  • [22] A novel ID-based authenticated group key agreement protocol using bilinear pairings
    Li, Lung-Chung
    Tsai, Yao-Pin
    Liu, Ru-Sheng
    2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 342 - +
  • [23] ID-Based one round authenticated group key agreement protocol with bilinear pairings
    Shi, YJ
    Chen, GL
    Li, JH
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 757 - 761
  • [24] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [25] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [26] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [27] A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 915 - 932
  • [28] An efficient secure key issuing protocol in ID-based cryptosystems
    Gangishetti, R
    Gorantla, MC
    Das, ML
    Saxena, A
    Gulati, VP
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 674 - 678
  • [29] Efficient ID-based group key agreement with bilinear maps
    Choi, KY
    Hwang, JY
    Lee, DH
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 130 - 144
  • [30] Anonymous ID-based group key agreement for wireless networks
    Wan, Zhiguo
    Ren, Kui
    Lou, Wenjing
    Preneel, Bart
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2615 - +