Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:2
|
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 50 条
  • [41] Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
    Wahaballa, Abubaker
    ELECTRONICS, 2022, 11 (21)
  • [42] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [43] DM-GKM: A key management scheme for dynamic group based applications
    Iqbal, Salman
    Kiah, Miss Laiha Mat
    Rehman, Aqeel Ur
    Abbas, Zahid
    Daghighi, Babak
    COMPUTER NETWORKS, 2020, 182
  • [44] A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid
    Mohammadali, Amin
    Haghighi, Mohammad Sayad
    Tadayon, Mohammad Hesam
    Mohammadi-Nodooshan, Alireza
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2834 - 2842
  • [45] Identity-based data storage scheme with anonymous key generation in fog computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Xianmin
    SOFT COMPUTING, 2020, 24 (08) : 5561 - 5571
  • [46] OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT
    Zhang, Yudi
    Li, Yumei
    Zheng, Mingwu
    Susilo, Willy
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 383 - 402
  • [47] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [48] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [49] Secure Path Key Establishment Schemes Based on Random Key Management for WSN
    Ahlawat, Priyanka
    Dave, Mayank
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES INDIA SECTION A-PHYSICAL SCIENCES, 2021, 91 (03) : 555 - 567
  • [50] An efficient group key management scheme for secure multicast with multimedia applications
    Zhang, CN
    Li, Z
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 364 - 378