DOI QR코드

DOI QR Code

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi (Colleage of Computer and Information Engineering, Zhejiang Gongshang University) ;
  • Yang, Xianbo (Colleage of Computer and Information Engineering, Zhejiang Gongshang University) ;
  • Shao, Jun (Colleage of Computer and Information Engineering, Zhejiang Gongshang University)
  • Received : 2012.09.15
  • Accepted : 2012.12.10
  • Published : 2012.12.31

Abstract

Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

Keywords

Cited by

  1. Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication vol.7, pp.4, 2012, https://doi.org/10.3837/tiis.2013.04.016
  2. Role-Balance Based Multi-Secret Images Sharing using Boolean Operations vol.8, pp.5, 2012, https://doi.org/10.3837/tiis.2014.05.016
  3. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications vol.10, pp.11, 2012, https://doi.org/10.1109/tifs.2015.2447933
  4. An effective key distribution for secure internet pay‐TV using access key hierarchies vol.9, pp.18, 2016, https://doi.org/10.1002/sec.1680
  5. A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application vol.6, pp.None, 2012, https://doi.org/10.1109/access.2018.2799007