A strongly secure and efficient certificateless authenticated asymmetric group key agreement protocol

被引:0
|
作者
Sun H. [1 ]
Cai Z. [2 ]
Zhang J. [1 ]
Zhang L. [1 ]
Gan Y. [3 ]
机构
[1] Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou
[2] School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou
[3] Zhengzhou Institute of Technology, Zhengzhou
关键词
Asymmetric group key agreement; Certificateless key cryptography; Provable security; Super adversaries;
D O I
10.23940/ijpe.18.11.p29.28312841
中图分类号
学科分类号
摘要
In Eurocrypt’2009, Wu et al. (2009) presented an important primitive named the asymmetric group key agreement (AGKA) protocol. In such a primitive, a group of users generate a common public encryption key, and each user only holds his own secret decryption key. Authenticated asymmetric group key agreement (AAGKA) protocols are a kind of AGKA protocol that can be secure against active attacks. AAGKA protocols in certificateless public key cryptography (CL-PKC) have some preponderance than those in identity-based cryptography and PKI cryptography. However, existing AAGKA protocols in CL-PKC only consider security against normal type adversaries, the weakest adversaries considered in CL-PKC literature. To solve this problem, an improved security model that considers security against super adversaries and a provably secure certificateless AAGKA protocol under the improved security model are proposed. Efficiency comparison shows that the proposed protocol is more efficient. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2831 / 2841
页数:10
相关论文
共 50 条
  • [1] Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
    Wei, Guiyi
    Yang, Xianbo
    Shao, Jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (12): : 3352 - 3365
  • [2] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [3] An Improved Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 337 - 341
  • [4] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [5] A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [6] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [7] A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks
    Semal, Benjamin
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    2018 IEEE/AIAA 37TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2018, : 233 - 240
  • [8] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [9] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    Wireless Personal Communications, 2015, 85 : 879 - 898
  • [10] Authenticated asymmetric group key agreement based on certificateless cryptosystem
    Lv, Xixiang
    Li, Hui
    Wang, Baocang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2014, 91 (03) : 447 - 460