A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group
详细信息    查看全文
  • 作者:Abhimanyu Kumar ; Sachin Tripathi
  • 关键词:Group key agreement ; Certificateless public key cryptography ; ECC ; Anonymity ; Bilinear pairing ; AVISPA
  • 刊名:Wireless Personal Communications
  • 出版年:2015
  • 出版时间:May 2015
  • 年:2015
  • 卷:82
  • 期:2
  • 页码:1027-1045
  • 全文大小:1,150 KB
  • 参考文献:1.Al-Riyami, S. S., & Paterson K. G. (2003). Certificateless public key cryptography. 2894, 452-73.
    2.Teng, J., & Wu, C. (2012). A provable authenticated certificateless group key agreement with constant rounds. Communications and Networks, Journal of, 14(1), 104-10.View Article
    3.Geng, M., Zhang, F., & Gao, M. (2009). A secure certificateless authenticated group key agreement protocol. Multimedia Information Networking and Security, 2009. MINES-9. International Conference on, 1, 342-46.
    4.Heo S., Kim Z., & Kim K. (2007). Certificateless authenticated group key agreement protocol for dynamic groups. In Global telecommunications conference, 2007. GLOBECOM-7. IEEE, (pp. 464-68) Nov.
    5.Lee E. J., Lee S. E., & Yoo K. Y. (2008). A certificateless authenticated group key agreement protocol providing forward secrecy. In Proceedings of the 2008 international symposium on ubiquitous multimedia computing, UMC-8 (pp. 124-29), Washington, DC, USA, IEEE Computer Society.
    6.Cao, C., Ma, J., & Moon, S. (2007). Provable efficient certificateless group key exchange protocol. Wuhan University Journal of Natural Sciences, 12(1), 41-5.View Article MathSciNet
    7.Xie, L., & He, M. (2010). A dynamic id-based authenticated group key exchange protocol without pairings. Wuhan University Journal of Natural Sciences, 15(3), 255-60.View Article MathSciNet
    8.Kumar, A., Tripathi, S., Jaiswal, P. (2014). A pairing free certificateless group key agreement protocol with constant round. In Advanced Computing, Networking and Informatics-Volume 2, Volume 28 of Smart Innovation, Systems and Technologies, (pp 341-49). Springer International Publishing.
    9.Zheng, S., Manz, D., & Alves-Foss, J. (2007). A communication-computation efficient group key algorithm for large and dynamic groups. Computer Networks, 51(1), 69-3.View Article MATH
    10.Kim, Y., Perrig, A., & Tsudik, G. (2004). Tree-based group key agreement. ACM Transactions on Information and System Security, 7(1), 60-6.View Article
    11.Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905-21.View Article
    12.Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Advances in Cryptology, Volume 196 of Lecture Notes in Computer Science (pp. 47-3). Berlin Heidelberg: Springer.
    13.Reddy, K. C., & Nalla, D. (2002). Identity based authenticated group key agreement protocol. In Progress in Cryptology INDOCRYPT 2002, Volume 2551 of Lecture Notes in Computer Science (pp 215-33). Berlin Heidelberg: Springer.
    14.Choi, K. Y., Hwang, J. Y., & Lee, D. H. (2004). Efficient id-based group key agreement with bilinear maps. Public Key Cryptography PKC 2004, volume 2947 of Lecture Notes in Computer Science (pp. 130-44). Berlin Heidelberg: Springer.
    15.Konstantinou, E. (2013). An efficient constant round id-based group key agreement protocol for ad hoc networks. Network and System Security, volume 7873 of Lecture Notes in Computer Science (pp. 563-74) Berlin Heidelberg: Springer.
    16.Wan, Z., Ren, K., Lou, W., & Preneel, B. (2008). Anonymous id-based group key agreement for wireless networks. In Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 2615-620. doi: 10.-109/?WCNC.-008.-59
    17.He, D., & Chen, Y. (2011). An efficient certificateless authenticated key agreement protocol without bilinear pairings. CoRR, arXiv:-106.-898 .
    18.Kim, Y. J., Kang, J. G., Kim, C. H., & Kim, Y. M. (2013). An efficient pairing-free certificateless two-party authenticated key agreement protocol in the eck model. CoRR, arXiv:-304.-383 .
    19.Mohamed, N. A. F., Hashim, M. H. A., Bashier, E. B. M., & Hassouna M. E. H. (2012). Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol. In Internet Security (WorldCIS), 2012 World Congress on (pp. 167-72). IEEE.
    20.Farouk, A., Fouad M. M., & Abdelhafez A. A. (2014). Analysis and improvement of pairing-free certificate-less two-party authenticated key agreement protocol for grid computing. arXiv preprint arXiv:-403.-844 .
    21.Luo, M., & Zhao, H. (2014) An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 1-0. doi:10.-007/?s11277-014-2157-5 .
    22.Yao, G., & Feng, D. (2010). A complete anonymous group key agreement protocol. Networks Security Wireless Communications and Trusted Computing (NSWCTC) 2010 Second International Conference on, 2, 357-60.View Article
    23.Park, H., Kim, Z., & Kim, K. (2009). Forward secure id-based group key agreement protocol with anonymity. In Emerging Security Information, Systems and Technologies, 2009. SECURWARE -9. Third International Conference on, (274-79). IEEE. doi:10.-109/?SECURWARE.-009.-9 .
    24.Wang, E. K., Ye, Y., & Xu, X. (2014). Location-based distributed group key agreement scheme for vehicula
  • 作者单位:Abhimanyu Kumar (1)
    Sachin Tripathi (1)

    1. Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, 826004, Jharkhand, India
  • 刊物类别:Engineering
  • 刊物主题:Electronic and Computer Engineering
    Signal,Image and Speech Processing
    Processor Architectures
  • 出版者:Springer Netherlands
  • ISSN:1572-834X
文摘
Group key agreement protocol is the primary requirement of several groupware applications like secure conferences; pay-per view, etc. which requires secure and authentic conversations among a group of participants via public networks. Protocols based on the certificateless public key cryptography (CL-PKC) are in demand because it overcomes the complex certificate management of traditional public key cryptography, as well as the key escrow problem of identity-based cryptography. Several group applications often need users anonymity also, along with their security features. However in current literature only few group key agreement protocols are available which supports user’s anonymity. Further almost all GKA protocols based on CL-PKC are employs bilinear pairing in their operations. The expensive computation of pairing motivates the researchers to propose pairing free protocols based on the CL-PKC. The present paper proposes a pairing free certificateless group key agreement protocol that meets the efficiency, authenticity, and strong security with complete anonymity. The formal security validation of proposed protocol has been done by using automated validation of internet security protocols and applications tool which shows that it is unforgeable against the various attacks. The proposed protocol has the comparable performance than other existing protocols in terms of computation and communication overheads.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700