A Dynamic ID-Based Authenticated Group Key Exchange Protocol without Pairings

被引:0
|
作者
XIE Liyun
机构
关键词
group key exchange; eCK security model; without pairings;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties’ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the eCK (enhanced Canetti-Krawczyk) security model.
引用
收藏
页码:255 / 260
页数:6
相关论文
共 50 条
  • [1] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [2] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [3] ID-Based one round authenticated group key agreement protocol with bilinear pairings
    Shi, YJ
    Chen, GL
    Li, JH
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 757 - 761
  • [4] A novel ID-based authenticated group key agreement protocol using bilinear pairings
    Li, Lung-Chung
    Tsai, Yao-Pin
    Liu, Ru-Sheng
    2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 342 - +
  • [5] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [6] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [7] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [8] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    Journal of Shanghai Jiaotong University, 2005, (03) : 236 - 241
  • [9] Security of an efficient ID-based authenticated key agreement protocol from pairings
    Wang, SB
    Cao, ZF
    Bao, HY
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 342 - 349
  • [10] ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 221 - 231