Multiparty authentication services and key agreement protocols with semi-trusted third party

被引:0
|
作者
Dong Zheng
Kefei Chen
Jinyuan You
机构
[1] Shanghai Jiaotong University,Department of Computer Science and Engineering
关键词
secure key establishment; authentication; group communication;
D O I
暂无
中图分类号
学科分类号
摘要
This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.
引用
收藏
页码:749 / 756
页数:7
相关论文
共 50 条
  • [21] Continuous-variable multiparty quantum key agreement based on third party
    Zhou, Yi-Hua
    Zhang, Jing
    Shi, Wei-Min
    Yang, Yu-Guang
    Wang, Mao-Feng
    [J]. MODERN PHYSICS LETTERS B, 2020, 34 (06):
  • [22] A fair exchange protocol based on short signature with the off-line semi-trusted third party
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    不详
    [J]. Xi'an Dianzi Keji Daxue Xuebao, 2007, 1 (92-95):
  • [23] Semi-trusted Collaborative Framework for Multi-party Computation
    Wong, Kok Seng
    Kim, Myung Ho
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 411 - 427
  • [24] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    [J]. INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412
  • [25] An Authentication Protocol Without Trusted Third Party
    Shieh, Shiuh-Pyng
    Yang, Wen-Her
    Sun, Hun-Min
    [J]. IEEE COMMUNICATIONS LETTERS, 1997, 1 (03) : 87 - 89
  • [26] RETRACTED ARTICLE: Secure Dynamic Group Data Sharing in Semi-trusted Third Party Cloud Environment
    V E Sathishkumar
    Wesam Atef Hatamleh
    Abeer Ali Alnuaim
    Mohamed Abdelhady
    B. Venkatesh
    S Santhoshkumar
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 5695 - 5695
  • [27] Communication-efficient three-party protocols for authentication and key agreement
    Lee, Tian-Fu
    Liu, Jenn-Long
    Sung, Mei-Jiun
    Yang, Shiueng-Bien
    Chen, Chia-Mei
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 58 (04) : 641 - 648
  • [28] Equitable Multiparty Quantum Communication Without a Trusted Third Party
    Pramanik, Tanumoy
    Lee, Dong-Hwa
    Cho, Young-Wook
    Lim, Hyang-Tag
    Han, Sang-Wook
    Jung, Hojoong
    Moon, Sung
    Lee, Kwang Jo
    Kim, Yong-Su
    [J]. PHYSICAL REVIEW APPLIED, 2020, 14 (06)
  • [29] A new proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem
    [J]. Tahat, N. (nedal@hu.edu.jo), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08):
  • [30] RETRACTED: Secure Dynamic Group Data Sharing in Semi-trusted Third Party Cloud Environment (Retracted Article)
    Sathishkumar, V. E.
    Hatamleh, Wesam Atef
    Alnuaim, Abeer Ali
    Abdelhady, Mohamed
    Venkatesh, B.
    Santhoshkumar, S.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (04) : 5695 - 5695