Universally Composable Asymmetric Group Key Agreement Protocol

被引:0
作者
Chen, Yong [1 ]
He, Mingxing [1 ]
Zeng, Shengke [1 ]
Li, Xiao [2 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu, Peoples R China
[2] Xihua Univ, Sch Sci, Chengdu, Peoples R China
来源
2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS) | 2015年
关键词
Asymmetric group key agreement; Ideal functionality; Universal composability;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We analyze the security of asymmetric group key agreement (ASGKA) protocol in the universal composability (UC) framework. An ideal functionality that is suitable for ASGKA protocol is proposed. And we show that the ASGKA protocol securely realizes the proposed ideal functionality that can resist attacks by malicious insiders. The UC framework allows the protocols to guarantee their security under arbitrary protocol environment.
引用
收藏
页数:6
相关论文
共 15 条
  • [1] [Anonymous], 2010, EURASIP J ADV SIG PR, DOI DOI 10.1109/EC0C.2010.5622099
  • [2] Bresson E., 2001, P 8 ACM C COMP COMM, P255, DOI DOI 10.1145/501983.502018
  • [3] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [4] Universally composable signature, certification, and authentication
    Canetti, R
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 219 - 233
  • [5] Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P265
  • [6] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [7] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Fujisaki, Eiichiro
    Okamoto, Tatsuaki
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 80 - 101
  • [8] Gorantla M.C., 2009, P 4 INT S INF COMP C, P146
  • [9] Hofheinz D, 2003, LECT NOTES COMPUT SC, V2808, P61
  • [10] Katz J, 2003, LECT NOTES COMPUT SC, V2729, P110