Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:2
|
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 50 条
  • [31] An efficient scalable key management scheme for secure group communication
    张骏
    谷大武
    马范援
    白英彩
    Journal of Harbin Institute of Technology, 2006, (05) : 607 - 612
  • [32] A key management scheme for secure group communication using binomial key trees
    Aparna, R.
    Amberker, B. B.
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2010, 20 (06) : 383 - 418
  • [33] Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
    Yu, Jia
    Xia, Hui
    Zhao, Huawei
    Hao, Rong
    Fu, Zhangjie
    Cheng, Xiangguo
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (03) : 1467 - 1491
  • [34] Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
    Li, Xiangxue
    Qian, Haifeng
    Weng, Jian
    Yu, Yu
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 503 - 511
  • [35] An Identity-Based Secure Communication Scheme for Advanced Metering Infrastructure in Smart Grid
    Zhang, Taimin
    Lu, Xin
    Ji, Xiaoyu
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6959 - 6964
  • [36] A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
    Han, Wendie
    Zhang, Rui
    Zhang, Lei
    Wang, Lulu
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 986 - 991
  • [37] A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
    Unal, Devrim
    Al-Ali, Abdulla
    Catak, Ferhat Ozgur
    Hammoudeh, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 433 - 445
  • [38] A Novel Biometric Signcryption Scheme that Is Identity-based and Group-oriented
    Wang, Mingwen
    Tang, Dongming
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 849 - 854
  • [39] Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
    Ramadan, Mohammed
    Raza, Shahid
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16594 - 16604
  • [40] Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
    Lian, Huanhuan
    Kang, Burong
    Yang, Libao
    IEEE ACCESS, 2024, 12 : 98611 - 98622