scispace - formally typeset
Journal ArticleDOI

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

Guiyi Wei, +2 more
- 30 Dec 2012 - 
- Vol. 6, Iss: 12, pp 3352-3365
TLDR
The certificateless authenticated asymmetric group key agreement protocol is proposed, which does not have certificate management burden and key escrow problem, and achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security.
Abstract
Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.’s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.’s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

read more

Citations
More filters
Journal ArticleDOI

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications

TL;DR: This paper proposes a one-round dynamic asymmetric GKA protocol which allows a group of members to dynamically establish a public group encryption key, while each member has a different secret decryption key in an identity-based cryptosystem.
Journal ArticleDOI

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application

TL;DR: A dynamic and cross-domain authenticated asymmetric group key agreement that adopts cross- domain authentication mechanism to avoid the security risks of key escrow and the complexity of certificate management and is proven secure under the inverse computational Diffie-Hellman problem assumption.
Journal ArticleDOI

An authenticated asymmetric group key agreement based on attribute encryption

TL;DR: An authenticated asymmetric group key agreement based on attribute encryption (ABE-AAGKA) is proposed, which combines the advantages of attribute encryption and identity authentication and is proven to be secure under the inverse computational Diffie-Hellman (ICDH) problem assumption.
Journal ArticleDOI

A hierarchical group key agreement protocol using orientable attributes for cloud computing

TL;DR: A hierarchical group key agreement protocol using orientable attribute (HGKA-OA) is proposed, which is proven secure under the Decisional Bilinear Diffie-Hellman (DBDH) problem assumption and performance analysis shows that the proposed scheme is more efficient than existing works.
Journal ArticleDOI

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication

TL;DR: The proposed group key agreement protocol based on privacy protection and attribute authentication (GKA-PPAA) provides hiding the identity information and privacy protection of the individual, and also proposes information sharing access control, which increases the flexibility of group key management.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Book ChapterDOI

A One Round Protocol for Tripartite Diffie-Hellman

Antoine Joux
TL;DR: A three participants variation of the Diffie-Hellman protocol is proposed, based on the Weil and Tate pairings on elliptic curves, which were first used in cryptography as cryptanalytic tools for reducing the discrete logarithm problem on some elliptic curve to the discreteLogarithms problem in a finite field.
Related Papers (5)