Welcome to Journal of Beijing Institute of Technology
Volume 15Issue 2
.
Turn off MathJax
Article Contents
LI Ming, WANG Yong, GU Da-wu, BAI Ying-cai. Authenticated Key Agreement in Group Settings[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2006, 15(2): 186-189.
Citation: LI Ming, WANG Yong, GU Da-wu, BAI Ying-cai. Authenticated Key Agreement in Group Settings[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2006, 15(2): 186-189.

Authenticated Key Agreement in Group Settings

Funds:Sponsored bythe National Natural Science Foundation of China(60203012)
  • Received Date:2004-08-25
  • An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.
  • loading
  • [1]
    Per rig A. Efficient collaborative key management proto cols for secure autonomous group communication[Z]. In ternational Wor kshop on Cryptog raphic Techniques andE Commerce, Ho ng Kong, 1999.
    [2]
    Joux A. A one round protocol for tripart ite Diffie Hell man[Z]. 4th Algorithmic Number T heory Symposium,Leiden, the Netherlands, 2000.
    [3]
    Kim Y, Tsudik G. Communicat ion efficient g roup keyagr eement[Z]. 16th I nternational Conference on Infor mation Security (IFIP/SEC 2001), Paris, 2001.
    [4]
    Al Riyami S S, Paterson K G. Aut henticated three partykey agreement protocols from pair ings[EB/OL]. http: 0epr int. iacr. org / 2002/ 035/, 2002-03-20/ 2003-12-24.
    [5]
    Bresson E, Chev assut O, Pointchev al D. Provably au thenticated group Diffie Hellman key ex change—the dy-namic case[Z]. 7th International Conference on t he The ory and Application of Cryptology and Informat ion Secu rity, Go ld Coast, Australia, 2001.
    [6]
    Reddy K C, Nalla D. Identity based authenticated groupkey agreement protocol[Z]. Third Inter national Confer ence on Crypto logy in I ndia, Hyderabad, India, 2002.
    [7]
    Smart N P. An identity based authent icated key agr ee ment protocol based on the Weil pairing[EB/OL]. http:0 ww w. ime. usp. br/ rt/ cranalysis/, 2004-02-20/2004-02-24.
    [8]
    Joux A. The Weil and Tate pair ings as building blocks forpublic key cryptosystems [Z]. 5th Inter national Sympo sium on Algor ithmic Number Theory, Sydney, Australia,2002.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (279) PDF downloads(0) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map