Welcome to Journal of Beijing Institute of Technology
Volume 14Issue 2
.
Turn off MathJax
Article Contents
LI Ming, WANG Yong, GU Da-wu, BAI Ying-cai. Pairings-Based Protocol for Group Key Agreement[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(2): 221-224.
Citation: LI Ming, WANG Yong, GU Da-wu, BAI Ying-cai. Pairings-Based Protocol for Group Key Agreement[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(2): 221-224.

Pairings-Based Protocol for Group Key Agreement

  • Received Date:2003-10-14
  • An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves and public-key certificates. The result suite builds its security on the hardness of the bilinear Diffie-Hellman (BDH) problem in the random oracle model, and provides implicit key authentication, perfect forward secrecy and unknown key-share secrecy.
  • loading
  • [1]
    Boneh D,F ranklin M.Identity based encrypt ion fr omt he W eil pairing[A]. Proceedings o f Crypto 01[C]. California:Spr ing er Verlag,2001.213-229.
    [2]
    A l Riyami S S,Paterson K G.Aut henticated three partykey agreement protocols from pair ings
    [EB/OL]. http:0epr int.iacr.org/2002/035,2002-10-10/2003-04-10.
    [3]
    Bresson E,Chevassut O,Pointcheval D.Pro vably authenticated group Diffie Hellman key exchange%T he dynamic case[A]. Proceedings of Asiacry pt[C]. Queensland,A ustralia:Springer V er lag,2001.290-309.
    [4]
    Steiner M,T sudik G,Waidner M.CL IQ U ES:A newapproach to g roup key ag reement[A]. Proceedings of the18th International Conference on Distr ibuted Comput ingSystems[C]. Amsterdam,Netherlands:IEEE ComputerSociety,1998.380-387.
    [5]
    Blake W ilson S,M enezes A.Authenticated Diffie Hellman key ag reement protocols[A]. T he 5th AnnualWorkshop o n Selected Ar eas in Cr yptogr aphy[C]. NewY ork:Springer V erlag,1999.339-361.
    [6]
    A teniese G,Steiner M,T sudik G.N ew multiparty authentication ser vices and key agreement protocols[J]. IEEE Journal on Selected A reas in Communications,2000,18:628-639.
    [7]
    K im Y,T sudik G.Communication efficient gr oup key agr eement[A]. Proceedings of the 17th International Information Secur ity Confer ence[C]. Paris:Kluwer,2001.229-244.
    [8]
    Joux A.T he weil and T ate Pairings as building blo cks forpublic key cryptosystems[A]. Pro ceedings of the T hirdEdition of the Only Event Entir ely Dev oted to A nt Algorithms and to Ant Colony Optimizatio n[C]. Brussels,Belgium:Springer V er lag,2002.20-32
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (100) PDF downloads(0) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map