Provably authenticated group key agreement based on braid groups - the dynamic case

被引:5
作者
Hiranvanichakorn P. [1 ]
机构
[1] Graduate School of Applied Statistics, National Institute of Development Administration Bangkok, 118, Seri Thai Road, Klong-Chan, Bangkapi, Bangkok
来源
Int. J. Netw. Secur. | / 4卷 / 517-527期
关键词
Authenticated group key agreement; BAN authentication logic; Braid groups;
D O I
10.6633/IJNS.201707.19(4).04
中图分类号
学科分类号
摘要
Most group key agreement protocols make use of modular exponential operations which require extensive computing resources in devices. Thus, they are unsuitable for resource- constrained devices such as mobile phones, smart cards and intelligent watches. This paper proposes a group key agreement protocol based on braid groups which requires only multiplication operations. The proposed protocol is a scalable one and needs only two rounds for setting a secure group communication. To prevent a man-in-the-middle attack, exchanged messages are simply authenticated by using users' long-term public and private keys instead of signatures. Authentication proofs are also made by using well-known BAN logic. The protocol is designed for dynamic group communication in which member join, member leave, group merge and group partition are discussed. The proposed algorithms take advantage of precomputed values achieved in previous sessions to update keys in subsequent session. This makes the scheme generates fewer communicating messages and lessens user devices' computation. Comparisons of security and complexity among several two-round protocols are also discussed in this article.
引用
收藏
页码:517 / 527
页数:10
相关论文
共 21 条
  • [1] Aneksrup T., Hiranvanichakorn P., Efficient group key agreement on tree-based braid groups, Computer and Information Science, 4, 1, pp. 14-27, (2011)
  • [2] Artin E., Theory of braids, Annals of Mathematics, 48, 1, pp. 101-126, (1947)
  • [3] Bresson E., Chevassut O., Pointcheval D., Provably authenticated group diffie-hellman key exchange - The dynamic case, Proceedings ofAdvances on Cryptology (Asiacrypt'01), pp. 290-309, (2001)
  • [4] Burrows M., Abadi M., Needham R., A logic of authentication, ACM Transactions on Computer Systems, 8, 1, pp. 18-36, (1990)
  • [5] Chan K.C., Chan S.H., Key management approaches to offer data confidentiality for secure mul-ticasts, IEEE Network, 17, 5, pp. 30-39, (2003)
  • [6] Chaturvedi A., Lal S., An authenticated key agreement protocol using conjugacy problem in braid groups, International Journal of Network Security, 6, 2, pp. 181-184, (2008)
  • [7] Dutta R., Barua R., Provably secure constant round contributory group key agreement in dynamic setting, IEEE Transactions on Information Theory, 54, 5, pp. 2007-2025, (2008)
  • [8] Hwang J.Y., Lee S.M., Lee D.H., Scalable key exchange transformation: From two party to group, Electronic Letters, 40, 12, pp. 728-729, (2004)
  • [9] Kim Y., Perrig A., Tsudik G., Tree-based group key agreement, ACM Transactions on Information and System Security, 7, 1, pp. 60-96, (2004)
  • [10] Ko K.H., Lee J.W., Thomas T., Towards generating secure keys for braid cryptography, Designs, Codes and Cryptography, 45, 3, pp. 317-333, (2007)