Username   Password       Forgot your password?  Forgot your username? 

 

A Strongly Secure and Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

Volume 14, Number 11, November 2018, pp. 2831-2841
DOI: 10.23940/ijpe.18.11.p29.28312841

Haiyan Suna, Zengyu Caib, Jianwei Zhanga, Ling Zhanga, and Yong Ganc

aSoftware Engineering College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
bSchool of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
cZhengzhou Institute of Technology, Zhengzhou, 450044, China

(Submitted on August 12, 2018; Revised on September 15, 2018; Accepted on October 8, 2018)

Abstract:

In Eurocrypt’2009, Wu et al. (2009) presented an important primitive named the asymmetric group key agreement (AGKA) protocol. In such a primitive, a group of users generate a common public encryption key, and each user only holds his own secret decryption key. Authenticated asymmetric group key agreement (AAGKA) protocols are a kind of AGKA protocol that can be secure against active attacks. AAGKA protocols in certificateless public key cryptography (CL-PKC) have some preponderance than those in identity-based cryptography and PKI cryptography. However, existing AAGKA protocols in CL-PKC only consider security against normal type adversaries, the weakest adversaries considered in CL-PKC literature. To solve this problem, an improved security model that considers security against super adversaries and a provably secure certificateless AAGKA protocol under the improved security model are proposed. Efficiency comparison shows that the proposed protocol is more efficient.

 

References: 29

                  1. M. Burmester and Y. Desmedt, “A Secure and Efficient Conference Key Distribution System,” in Proceedings of the Eurocrypt 1994, pp. 275-286, Perugia, Italy, May 1994
                  2. E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, “Provably Authenticated Group Diffie-Hellman Key Exchange,” in Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264, Philadelphia, USA, November 2001
                  3. K. Y. Choi, J. Y. Hwang, and D. H. Lee, “Efficient ID-based Group Key Agreement with Bilinear Maps,” in Proceedings of the PKC 2004, pp. 130-144, Singapore, March 2004
                  4. M. Abdalla and D. Pointcheval, “A Scalable Password-based Group Key Exchange Protocol in the Standard Model,” in Proceedings of the Asiacrypt 2006, pp. 332-347, Shanghai, China, December 2006
                  5. Q. H. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer, “Asymmetric Group Key Agreement,” in Proceedings of the Eurocrypt 2009, pp. 153-170, Cologne, Germany, April 2009
                  6. Q. H. Wu, B. Qin, L. Zhang, and J. Domingo-Ferrer, “Bridging Broadcast Encryption and Group Key Agreement,” in Proceedings of the Asiacrypt 2011, pp. 143-160, Seoul, South Korea, December 2011
                  7. Q. H. Wu, X. Y. Zhang, M. Tang, P. Yin, and Z. L. Qiu, “Extended Asymmetric Group Key Agreement for Dynamic Groups and its Applications,” China Communication, Vol. 8, No. 4, pp. 32-40, September 2011
                  8. X. Zhao, D. Wei, and H. Wang, “Asymmetric Group Key Agreement with Traitor Traceability,” in Proceedings of the 2010 International Conference on Computational Intelligence and Security, pp. 347-351, Nanning, China, December 2010
                  9. L. Zhang, Q. H. Wu, and B. Qin, “Authenticated Asymmetric Group Key Agreement Protocol and Its Application,” in Proceedings of the International Communications Conference (ICC 2010), pp. 1-5, Cape Town, South Africa, May 2010
                  10. A. Shamir, “Identity-based Cryptosystems and Signature Schemes,” in Proceedings of the Crypto 1984, pp. 47-53, Santa Barbara, California, USA, August 1984
                  11. S. S. Al-Riyami and K. G. Paterson, “Certificateless Public Key Cryptography,” in Proceedings of the Asiacrypt 2003, pp. 452-473, Taipei, Taiwan, November 2003
                  12. M. Girault, “Self-Certified Public Keys,” in Proceedings of Eurocrypt 1991, pp. 490-497, Brighton, UK, April 1991
                  13. X. W. Zhao, F. G. Zhang, and H. B. Tian, “Dynamic Asymmetric Group Key Agreement for Ad Hoc Networks,” Ad Hoc Networks, Vol. 9, No. 5, pp. 928-939, July 2011
                  14. L. Zhang, Q. H. Wu, B. Qin, and J. Domingo-Ferrer, “Asymmetric Group Key Agreement Protocol for Open Networks and Its Application to Broadcast Encryption,” Computer Networks, Vol. 55, No. 15, pp. 3246-3255, October 2011
                  15. C. Xu, Z. J. Li, Y. Mu, H. Guo, and T. Guo, “Affiliation-Hiding Authenticated Asymmetric Group Key Agreement,” The Computer Journal, Vol. 55, No. 10, pp. 1180-1191, October 2012
                  16. C. Xu, H. Guo, Z. J. Li, and Y. Mu, “New Construction of Affiliation-Hiding Authenticated Group Key Agreement,” Security and Communication Networks, Vol. 6, No. 6, pp. 723-734, June 2013
                  17. C. Xu, H. Guo, Y. Mu, and Z. J. Li, “Affiliation-Hiding Authenticated Asymmetric Group Key Agreement based on Short Signature,” The Computer Journal, Vol. 57, No. 10, pp. 1580-1590, October 2014
                  18. L. Zhang, Q. H. Wu, B. Qin, and J. Domingo-Ferrer, “Identity-based Authenticated Asymmetric Group Key Agreement Protocol,” in Proceedings of the COCOON 2010, pp. 510-519, Nha Trang, Vietnam, July 2010
                  19. L. Zhang, Q. H. Wu, B. Qin, and J. Domingo-Ferrer, “Provably Secure One-Round Identity-based Authenticated Asymmetric Group Key Agreement Protocol,” Information Sciences, Vol. 181, No. 19, pp. 4318-4329, October 2011
                  20. L. Zhang, Q. H. Wu, J. Domingo-Ferrer, B. Qin, S. S. M. Chow, and W. Shi, “Secure One-to-Group Communications Escrow-Free ID-based Asymmetric Group Key Agreement,” in Proceedings of the INSCRYPT 2013, pp. 239-254, Guangzhou, China, November 2013
                  21. L. Zhang, Q. H. Wu, J. Domingo-Ferrer, B. Qin, and Z. M. Dong. “Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 11, pp. 2352-2364, June 2015
                  22. J. T. Li and L. Zhang, “Sender Dynamic, Non-Repudiable, Privacy-Preserving and Strong Secure Group Communication Protocol,” Information Sciences, Vol. 414, No. 1, pp. 187-202, November 2017
                  23. G. Y. Wei, X. B. Yang, and J. Shao, “Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol,” KSII Transactions on Internet and Information Systems, Vol. 6, No. 12, pp. 3352-3365, December 2012
                  24. X. X. Lv, H. Li, and B. C. Wang, “Authenticated Asymmetric Group Key Agreement based on Certificateless Cryptosystem,” International Journal of Computer Mathematics, Vol. 91, No. 3, pp. 447-460, March 2014
                  25. L. Zhang, Q. H. Wu, B. Qin, H. Deng, J. W. Liu, and W. C. Shi, “Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement,” in Proceedings of the ISPEC 2014, pp. 496-510, Fuzhou, China, May 2014
                  26. L. Zhang, Q. H. Wu, B. Qin, H. Deng, J. T. Li, J. W. Liu, et al., “Certificateless and Identity-based Authenticated Asymmetric Group Key Agreement,” International Journal of Information Security, Vol. 16, No. 5, pp. 559-576, June 2017
                  27. X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless Signature Revisited,” in Proceedings of the ACISP 2007, pp. 308-322, Townsville, Australia, July 2007
                  28. S. Seo, K. Choi, J. Hwang, and S. Kim, “Efficient Certificateless Proxy Signature Scheme with Provable Security,” Information Sciences, Vol. 188, No. 1, pp. 322-337, April 2012
                  29. H. Y. Sun, Q. Y Wen, and W. M. Li, “A Strongly Secure Pairing-Free Certificateless Authenticated Key Agreement Protocol under the CDH Assumption,” SCIENCE CHINA Information Sciences, Vol. 59, No. 3, pp. 032109:1-032109:16, March 2016

                                   

                                  Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                   
                                  This site uses encryption for transmitting your passwords. ratmilwebsolutions.com