Forward Secure ID-based Group Key Agreement Protocol with Anonymity

被引:4
|
作者
Park, Hyewon [1 ]
Kim, Zeen [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol KAIST, Dept Informat & Commun Engn, Taejon 305732, South Korea
关键词
D O I
10.1109/SECURWARE.2009.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based group key agreement (GKA) has been increasingly researched with the advantage of simple public key management. However identities of group members can be exposed in the ID-based GKA protocol, so eavesdroppers can easily learn who belongs to the specific group. Recently, Wan et al. [7] proposed a solution for this problem, an anonymous ID-based GKA protocol, which can keep group members' anonymity to outside eavesdroppers; nevertheless, the protocol has some security flaws. This paper shows that Wan et al.'s GKA is insecure against colluding attack and their joining/leaving protocols do not guarantee forward and backward secrecy. We also propose a new forward secure ID-based GKA with anonymity from enhancing Wan et al.'s joining/leaving protocols. Our scheme provides forward and backward secrecy and is essentially just efficient as Wan et al.'s scheme.
引用
收藏
页码:274 / 279
页数:6
相关论文
共 50 条
  • [31] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [32] Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Chow, Sherman S. M.
    Shi, Wenchang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 239 - 254
  • [33] Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 295 - 298
  • [34] Genetic-IDGKA: Genetic ID-Based Group Key Agreement Protocol for Large MANETs
    Janani, V. S.
    Manikandan, M. S. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 313 - 333
  • [35] An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks
    Li-Ping Z.
    Yi W.
    Journal of Communications, 2010, 5 (08): : 620 - 626
  • [36] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [37] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654
  • [38] An ID-based authenticated dynamic group key agreement with optimal round
    TENG JiKai1
    2Graduate University of Chinese Academy of Sciences
    3Faculty of Mathematic and Information Science
    ScienceChina(InformationSciences), 2012, 55 (11) : 2542 - 2554
  • [39] An ID-based authenticated dynamic group key agreement with optimal round
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2542 - 2554
  • [40] Security analysis of an ID-based key agreement for peer group communication
    Vo, Duc-Liem
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (11) : 2624 - 2625