Multiparty authentication services and key agreement protocols with semi-trusted third party

被引:0
|
作者
Dong Zheng
Kefei Chen
Jinyuan You
机构
[1] Shanghai Jiaotong University,Department of Computer Science and Engineering
关键词
secure key establishment; authentication; group communication;
D O I
暂无
中图分类号
学科分类号
摘要
This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.
引用
收藏
页码:749 / 756
页数:7
相关论文
共 50 条
  • [1] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Zheng, D
    Chen, KF
    You, JY
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06) : 749 - 756
  • [2] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Awaneesh Kumar Yadav
    An Braeken
    Manoj Misra
    [J]. The Journal of Supercomputing, 2023, 79 : 11261 - 11299
  • [3] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11261 - 11299
  • [4] New multiparty authentication services and key agreement protocols
    Ateniese, G
    Steiner, M
    Tsudik, G
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 628 - 639
  • [5] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [6] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [7] A semi-trusted third party watermark protocol and implement framework
    Zhuang, YQ
    Wu, JQ
    Duan, F
    [J]. ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1981 - 1984
  • [8] A Fair Transaction Protocol with an Offline Semi-Trusted Third Party
    Qian, Wang
    Qi, Su
    [J]. ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2010, 4 : 249 - 257
  • [9] DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
    Ali, Mazhar
    Malik, Saif U. R.
    Khan, Samee U.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 642 - 655
  • [10] A multi-party non-repudiation protocol with semi-trusted third party
    Wang, CF
    Ge, JH
    Du, XJ
    Qu, J
    Zhao, TS
    Yang, SY
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 188 - 191