An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing

被引:36
作者
Liu, Yining [1 ,2 ]
Cheng, Chi [3 ]
Cao, Jianyu [1 ,2 ]
Jiang, Tao [3 ]
机构
[1] Guilin Univ Elect Technol, Sch Math & Computat Sci, Guilin 541004, Peoples R China
[2] Huazhong Univ Sci & Technol, Dept Elect & Informat Engn, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Wuhan Natl Lab Optoelect, Dept Elect & Informat Engn, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Group key transfer protocol; secret sharing; confidentiality; authentication;
D O I
10.1109/TC.2012.216
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure group communication, one-time session keys need to be shared among group members in a secure and authenticated manner. In this paper, we propose an improved authenticated key transfer protocol based on Shamir's secret sharing. The proposed protocol achieves key confidentiality due to security of Shamir's secret sharing and provides key authentication by broadcasting a single authentication message to all members. Furthermore, the proposed scheme resists against both insider and outsider attacks.
引用
收藏
页码:2335 / 2336
页数:2
相关论文
共 7 条
[1]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[2]   Authenticated Group Key Transfer Protocol Based on Secret Sharing [J].
Harn, Lein ;
Lin, Changlu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) :842-846
[3]   Scalable protocols for authenticated group key exchange [J].
Katz, Jonathan ;
Yung, Moti .
JOURNAL OF CRYPTOLOGY, 2007, 20 (01) :85-113
[4]  
Li CH, 1999, LECT NOTES COMPUT SC, V1587, P64
[5]  
Overbey J, 2005, CRYPTOLOGIA, V29, P59, DOI 10.1080/0161-110591893771
[6]   Generation of key predistribution schemes using secret sharing schemes [J].
Sáez, G .
DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) :239-249
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613