Forward Secure ID-based Group Key Agreement Protocol with Anonymity

被引:4
|
作者
Park, Hyewon [1 ]
Kim, Zeen [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol KAIST, Dept Informat & Commun Engn, Taejon 305732, South Korea
关键词
D O I
10.1109/SECURWARE.2009.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based group key agreement (GKA) has been increasingly researched with the advantage of simple public key management. However identities of group members can be exposed in the ID-based GKA protocol, so eavesdroppers can easily learn who belongs to the specific group. Recently, Wan et al. [7] proposed a solution for this problem, an anonymous ID-based GKA protocol, which can keep group members' anonymity to outside eavesdroppers; nevertheless, the protocol has some security flaws. This paper shows that Wan et al.'s GKA is insecure against colluding attack and their joining/leaving protocols do not guarantee forward and backward secrecy. We also propose a new forward secure ID-based GKA with anonymity from enhancing Wan et al.'s joining/leaving protocols. Our scheme provides forward and backward secrecy and is essentially just efficient as Wan et al.'s scheme.
引用
收藏
页码:274 / 279
页数:6
相关论文
共 50 条
  • [41] ID-based authenticated group key agreement from bilinear maps
    Xixiang Lv
    Hui Li
    Frontiers of Computer Science in China, 2010, 4 : 302 - 307
  • [42] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [43] ID-based authenticated group key agreement from bilinear maps
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 302 - 307
  • [44] ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 221 - 231
  • [45] Design of Efficient ID-Based Group Key Agreement Protocol Suited for Pay-TV Application
    Kumar, Abhimanyu
    Tripathi, Sachin
    Jaiswal, Priyanka
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1940 - 1944
  • [46] ID-based key agreement for multimedia encryption
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) : 298 - 303
  • [47] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [48] A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [49] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [50] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579