Provably secure anonymous authentication key agreement protocol for multicast group

被引:2
作者
Feng T. [1 ,2 ,3 ]
Liu Y.-Y. [1 ,4 ]
Ma J.-F. [3 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology
[2] Key Lab of the Network Security and Cryptology, Fujian Normal University
[3] Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University
[4] Technical Equipment Department, Economic Daily
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2011年 / 40卷 / 02期
关键词
Anonymity; Authentication; Group technology; Key agreement; Network protocols; Network security;
D O I
10.3969/j.issn.1001-0548.2011.02.023
中图分类号
学科分类号
摘要
With the idea of ring signcryption, an efficient anonymous group key agreement scheme is presented based on the Bilinear Diffie-Hellman (BDH) assumption. The scheme establishes a secure group key under the premise of authenticating group members. For both internal and external group members the scheme achieves different degree of anonymity, that is, the external users can absolutely not learn any information about the internal membership structure, and the internal users only can find out the member composition but cannot recognize the identity of any member. In order to achieve the forward security and backward security of group key, new scheme supports group members to renew their group key when the external nodes join the group or the internal members leave the group. The proposed scheme can establish the group session key through only one round, and therefore, its computation complexity and storage cost are efficiently reduced.
引用
收藏
页码:273 / 277
页数:4
相关论文
共 11 条
[1]  
Michael K.R., Aviel D.R., Crowds: anonymity for web transactions, ACM Transactions on Information and System Security (TISSEC), 1, 1, pp. 66-92, (1998)
[2]  
Wan R.-F., Li F.-W., Zhu J., An efficient anonymity mutual authentication protocol, Journal of University of Electronic Science and Technology of China, 34, 1, pp. 61-64, (2005)
[3]  
Feng G.-Z., Li C., Wu Y., An efficient anonymous authentication and key agreement protocol, Computer Engineering and Application, 42, 19, pp. 3-7, (2006)
[4]  
Deng S.-Y., Hu Z.-M., Niu X.-X., Et al., A wireless mutual authentication and key agreement protocol, Acta Electronica Sinica, 31, 1, pp. 135-138, (2003)
[5]  
Sherman S.M., Chow and kim-kwang raymond choo, strongly-secure identity-based key agreement and anonymous extension, ISC 2007, LNCS 4779, pp. 203-220, (2007)
[6]  
Cheng Z., Chen L., Comley R., Et al., Identity-based key agreement with unilateral identity privacy using pairings, ISPEC 2006, LNCS 3903, pp. 202-213, (2006)
[7]  
Wan Z.-G., Ren K., Lou W.-J., Et al., Anonymous ID-based group key agreement for wireless networks, Wireless Communications and Networking Conference, pp. 2615-2620, (2008)
[8]  
Li F.-G., Shirase M., Takagi T., Analysis and improvement of authenticatable ring signcryption scheme, Journal of Shanghai Jiaotong University: Science, 13, 6, pp. 679-683, (2008)
[9]  
Li X.-H., Ma J.-F., Wen X.-Z., Security extension for the canetti-krawczyk model in identity-based systems, Science in China, (Series E), 34, 10, pp. 1185-1192, (2004)
[10]  
Canetti R., Krawczyk H., Analysis of key-exchange protocols and their use for building secure channels, Eurocrypt 2001, LNCS 2045, pp. 453-474, (2001)