Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2010, Vol. 4 Issue (2) : 302-307    https://doi.org/10.1007/s11704-009-0063-x
RESEARCH ARTICLE
ID-based authenticated group key agreement from bilinear maps
Xixiang LV(), Hui LI
National Key Lab of Integrated Service Netwoks (ISN), Xidian University, Xi’an 710071, China
 Download: PDF(128 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Authenticated group key agreement (GKA) is an important cryptographic mechanism underlying many collaborative and distributed applications. Recently, identity (ID)-based authenticated GKA has been increasingly researched because of the authentication and simplicity of the ID-based cryptosystem. However, there are two disadvantages with this kind of mechanism: 1) the private key escrow is inherent and 2) the Private Key Generator (PKG) must send client private keys over secure channels, making private key’s distribution difficult. The two disadvantages, particularly secure channels, may be unacceptable for secure group communications application. Fortunately, we can avoid both of them. In this paper, with bilinear maps on ECC, we present a new authenticated group key agreement protocol that does not require secure channels. The basic idea is the usual way of circumventing escrow: double key and double encryption (verification). The secret key of a user is generated by a key generation center (KGC) and the user collaboratively. Each of them has “half” of the secret information about the secret key of the user, and there is no secret key distribution problem. In addition, the computation cost of the protocol is very low because the main computation is binary addition.

Keywords group key agreement      bilinear map      security group communication     
Corresponding Author(s): LV Xixiang,Email:{xxlv, lihui}@mail.xidian.edu.cn   
Issue Date: 05 June 2010
 Cite this article:   
Xixiang LV,Hui LI. ID-based authenticated group key agreement from bilinear maps[J]. Front Comput Sci Chin, 2010, 4(2): 302-307.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-009-0063-x
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I2/302
SchemeRoundBandwidthComputationPairing
Ref. [22]O(lgn)O(nlgn)O(nlgn)O(nlgn)
Ref. [23]2O(n)O(n)O(n)
Ref. [24]1(n-1) pointsin G1n2n
Ref. [17]lg(n)lg(n) pointsin G15lg(n)5lg(n)
Our protocol23n105
Tab.1  Comparison of ID-based AGKA protocols
1 Ateniese G, Steiner M, Tsudik G. New multi-party authentication services and key agreement protocols. IEEE Selected Areas in Communications , 2000, 18(4): 628-639
doi: 10.1109/49.839937
2 Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of Crypto’93. Springer, LNCS 773 . 1993, 232-249
3 Blake-Wilson S, Menezes A.Authenticated Diffie-Hellman key agreement protocols. In: Proceedings of SAC ’98, Springer, LNCS 1556 . 1998, 339-361
4 Bresson E, Chevassut O, Pointcheval D. Provably authenticated group Diffie-Hellman key exchange—the dynamic case. In: Proceedings of Asiacrypt’01, Springer-Verlag . 2001, 290-309
5 Hamey H, Muckenhim C. Group key management protocol (GKMP) architecture. RCF . 2094, July1997.
6 Hamey H, Muckenhim C. Group key management protocol (GKMP) Specification. RCF . 2093, July1997
7 Li C-H, Pieprzyk J. Conference key agreement from secret sharing. In: Proceedings of ACISP’99, Springer-Verlag, LNCS 1587 . 1999, 64-76
8 Bresson E, Catalano D. Constant round authenticated group key agreement via distributed computation. In: Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC’04), Springer, LNCS 2947 . 2004, 115-129
9 Kim Y, Perrig A, Tsudik G. Tree-based group key agreement. ACM Transactions on Information and System Security , 2004, 7(1): 60-96
doi: 10.1145/984334.984337
10 Steiner M, Tsudik G, Waidner M. Diffie-Hellman key distribution extended to groups. In: Proceedings of 3rd ACM Conf. Computer Commun. Security . 1996, 31-37
11 Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. , 2000, 11: 769-780
doi: 10.1109/71.877936
12 Ateniese G, Steiner M, Tsudik G. New multyparty authentication services and key agreement protocols. IEEE J. Select. Areas Commun. , 2000, 18: 628-639
doi: 10.1109/49.839937
13 Steiner M, Tsudik G, Waidner M. CLIQUES: a new approach to group key agreement. In: Proceedings of 18th Int. Conf. Distributed Computing Syst . (ICDCS’98). 1998, 380-387
14 Burmester M, Desmedt Y. A secure and efficient conference key distribution system. In: Advances in Cryptology-Eurocrypt’94, LNCS . 1994, 275-287
15 Choi K Y, Hwang J Y, Lee D H. Efficient ID-based group key agreement with bilinear maps. In: Proceedings of PKC’04, LNCS 2947 . 2004
16 Zhang F, Chen X. Attack on two ID-based authenticated group key agreement schemes from PKC 2004. Information Processing Lett. , 2004, 91: 191-193
doi: 10.1016/j.ipl.2004.04.008
17 Wang H J, Yao G, Jiang Q S. An identity-based group key agreement protocol from pairing. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security, IEEE . 2008, 532-537
18 Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings. Cryptology ePrint Archive , Report 2006/199
19 He Y Z, Han Z. An efficient authenticated group key agreement protocol. In: Proceedings of 41st Annual IEEE International Carnahan Conference on Security Technology . 2007, 250-254
20 Boneh D, Franklin M. Identity-based encryption from the weil pairing. Crypto 2001. LNCS 2139, Springer-Verlag . 2001, 213-229
21 Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In: Proceedings of Eurocrypt’98, LNCS 1403, Springer-Verlag . 1998, 236-250
22 Nalla D, Reddy K C. Identity based authenticated group key agreement protocol. In: Proceedings of Indocrypt’02, LNCS 2551, Springer-Verlag . 2002, 215-233
23 Choi K, Hwang J, Lee D. Efficient ID-based. group key agreement with bilinear maps. In: Proceedings of PKC’04, LNCS 2947, Springer-Verlag . 2004, 130-144
24 Shi Y J, Chen G L, Li J H. ID-based one round authenticated group key agreement protocol with bilinear pairings. In: Proceedings of 2005 International Conference on Information Technology: Coding and computing (ITCC 2005) . 2005, 1: 757-761
[1] Jiqiang LIU, Xun CHEN, Zhen HAN, . Full and partial deniability for authentication schemes[J]. Front. Comput. Sci., 2010, 4(4): 516-521.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed