Abstract
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties’ ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the eCK (enhanced Canetti-Krawczyk) security model.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Bresson E, Chevassut O, Pointcheval D, et al. Provably authenticated group Diffie-Hellman key exchange [C] // CCS’01: Proceedings of the 8th ACM Conference on Computer and Communications Security. New York: ACM Press, 2001: 255–264.
Bresson E, Chevassut O, Pointcheval D. Provably authenticated group Diffie-Hellman key exchange—the dynamic case [C] // Advances in Cryptology—Asiacrypt’01 (LNCS 2248). Berlin: Springer-Verlag, 2001: 290–309.
Bresson E, Chevassut O, Pointcheval D. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions [C] // Advances in Cryptology—Eurocrypt’02 (LNCS 2332). Berlin: Springer-Verlag, 2002: 321–336.
LaMacchia B A, Lauter K, Mityagin A. Stronger security of authenticated key exchange [C]//The First International Conference on Provable Security (LNCS 4784). Berlin: Springer-Verlag, 2007: 1–16.
Shamir A. Identity-based cryptosystems and signature schemes [C] // Proc Crypto’84 (LNCS 196). Berlin: Springer-Verlag, 1984: 47–53.
Reddy K C, Nalla D. Identity based authenticated group key agreement protocol [C] // Proceedings of Indocrypt’02 (LNCS 2551). Berlin: Springer-Verlag, 2002: 215–233.
Choi K Y, Hwang J Y, Lee D H. Efficient ID-based group key agreement with bilinear maps [C] // Proceeding of 2004 International Workshop on Practice and Theory in Public Key Cryptography (PKC04) (LNCS 2947). Berlin: Springer-Verlag, 2004: 130–144.
Zhang F, Chen X. Attack on two id-based authenticated group key agreement schemes [EB/OL]. [2009-10-28]. http://eprint.iacr.org/2003/259.pdf .
Zhang F, Chen X. Attack on an ID-based authenticated group key agreement scheme from PKC 2004 [J]. Information Processing Letters, 2004, 91(4): 191–193.
Du X, Wang Y, Ge J, et al. An improved ID-based authenticated group key agreement scheme [EB/OL]. [2009-10-28]. http://eprint.iacr.org/2003/260.pdf .
Wu S T, Chiu J H, Chieu B C. Identity-Based key agreement for peer group communication from pairings [J]. IEICE Trans Fundamentals, 2005, E88A(10): 2762–2768.
Vo D L, Kim K. Security Analysis of an ID-based key agreement for peer group communication [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007, E90A(11): 2624–2625.
Tang H, Zhu L, Zhang Z. Efficient ID-based two round authenticated group key agreement protocol [C] // WiCOM’08: 4th International Conference on Wireless Communication, Networking and Mobile Computing. New York: IEEE Press, 2008: 1–4.
Wan Z, Ren K, Lou W, et al. Anonymous ID-based group key agreement for wireless networks [C] // IEEE Wireless Communications and Networking Conference 2008. New York: IEEE Press, 2008: 2615–2620.
Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis [C] // The Sixth IMA International Conference on Cryptography and Coding (LNCS 1355). Berlin: Springer-Verlag, 1997: 30–45.
Zhu R W, Yang G, Wong D S. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices [J]. Theoretical Computer Science, 2007, 378(2): 198–207.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60773035)
Biography: XIE Liyun, male, Master, research direction: cryptography and information security.
Rights and permissions
About this article
Cite this article
Xie, L., He, M. A dynamic ID-based authenticated group key exchange protocol without pairings. Wuhan Univ. J. Nat. Sci. 15, 255–260 (2010). https://doi.org/10.1007/s11859-010-0315-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-010-0315-5