Identity based authenticated group key agreement protocol

被引:0
|
作者
Reddy, KC [1 ]
Nalla, D
机构
[1] Univ Hyderabad, AILab, Dept Comp Info Sci, Hyderabad 500046, Andhra Pradesh, India
[2] Ctr Distributed Learning, APSCHE, Hyderabad 500046, Andhra Pradesh, India
关键词
key agreement; group key agreement; elliptic curves; Weil pairing; cryptography; identity based; ID-based; Diffie-Hellman; Key Agreement Protocols; key trees; one-way function trees;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An important and popular trend in modem computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement protocol by extending the Identity based two-party Authenticated Key Agreement protocol [13] using the One-way function trees. A new function called the transformation function is defined, which is required in generating keys at any level from a lower level key in the key tree. The new protocol provides complete forward and backward secrecy. Authentication is implicit in this protocol, whereas it has to be explicitly dealt with in other Key Agreement protocols. ID-AGKA protocol is more advantageous for systems without a deployed PKI.
引用
收藏
页码:215 / 233
页数:19
相关论文
共 50 条
  • [1] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [2] An extended identity based authenticated asymmetric group key agreement protocol
    Ranjani, Reddi Siva
    Bhaskari, D. Lalitha
    Avadhani, P.S.
    International Journal of Network Security, 2015, 17 (05) : 510 - 516
  • [3] An authenticated hierarchical asymmetric group key agreement protocol based on identity
    Gan, Yong
    Wang, Bingli
    Zhuang, Yuan
    Cai, Zengyu
    Zhang, Qikun
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 815 - 824
  • [4] An authenticated 3-round identity-based group key agreement protocol
    Yao, Gang
    Wang, Hongji
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 538 - +
  • [5] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [6] AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING
    Yoon, Suk Bong
    COMMUNICATIONS OF THE KOREAN MATHEMATICAL SOCIETY, 2005, 20 (03): : 611 - 621
  • [7] Identity-based authenticated asymmetric group key agreement
    Tan, Yu'an, 1727, Science Press (51):
  • [8] An efficient pairing-free identity-based authenticated group key agreement protocol
    Tan, Zuowen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 534 - 545
  • [9] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +
  • [10] An efficient identity-based tripartite authenticated key agreement protocol
    Zuowen Tan
    Electronic Commerce Research, 2012, 12 : 505 - 518