ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, et al., “An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 827-835, 2014,
Citation: ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, et al., “An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 827-835, 2014,

An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks

Funds:  This work is supported by National Natural Science Foundation of China (No.61272511, No.61370063), 863 Program (No.2013AA01A212), PhD Research Fund of the Zhengzhou University of Light Industry, the Research Foundation of Beijing Institute of Technology (No.20120742012) and Shanghai Aerospace Science and Technology Fund (No.SAST201341).
  • Received Date: 2013-11-01
  • Rev Recd Date: 2014-03-01
  • Publish Date: 2014-10-05
  • A Group key agreement (GKA) protocol enables a group of communicating parties to negotiate a common secret key over an open, untrusted network. The design goal of GKA is to achieve secure group communication, which is an important research issue for mobile communication. The conventional (symmetric) GKA protocol allows a group of members to establish a common secret key for imbalanced mobile networks. However, only the group members can broadcast secret message to the group. To overcome this limitation, this paper proposes an authenticated asymmetric GKA protocol. Instead of a common secret key, each group member negotiates a common group public key and holds a different decryption key. The paper proposed protocol supports the dynamic nodes update of mobile networks, which has forward secrecy and backward secrecy of group key. This protocol is proven secure under the Bilinear Computational Diffie-Hellman problem assumption and the performance analysis shows that the proposed scheme is highly efficient.
  • loading
  • Wan Changsheng, Hu Aiqun and Zhang Juan, An elliptic curve based handoff authentication protocol for WLAN, Chinese Journal of Electronics, Vol.20, No.1, pp.165-169, 2011
    Xu Chunxiang and Zhou Junhui, ECC based dynamic multiparty key agreement, Chinese Journal of Electronics, Vol.18, No.2, pp.355-360, 2009.
    E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, Mutual authentication and group key agreement for low-power mobile devices, Computer Communications, Vol.27, No.17, pp.1730-1737, 2004.
    E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, Mutual authentication and group key agreement for low-power mobile devices, Comput Commun., Vol.27, No.7, pp.1730-1737, 2004.
    J. Nam, S. Kim and D. Won, A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices, IEEE Commun Lett. 2005, Vol.9, pp.429-431, 2005.
    J. Nam, J. Lee, S. Kim and D. Won, DDH-based group key agreement in a mobile environment. J. Syst. Softw., Vol.78, No.1, pp.73-83, 2005.
    J. Katz and M. Yung, Scalable protocols for authenticated group key exchange, Proceedings of Advances in Cryptology-Crypto'03, pp.110-125, 2003.
    Y.M. Tseng, A resource-constrained group key agreement protocol for imbalanced wireless networks, Comput. Secur., Vol.26, No.4, pp.331-337, 2007.
    C.C. Lee, T.H. Lim and C.S. Tsai, A new authenticated group key agreement in a mobile environment, Ann. Telecommun., Vol.64, No.11-12, pp.735-744, 2009.
    Q.F. Cheng, C.G. Ma and F.S. Wei, Analysis and improvement of a new authenticated group key agreement in a mobile environment, Ann. Telecommun., Vol.66, pp.331-337, 2011.
    J.L. Tsai, A novel authenticated group key agreement protocol for mobile environment, Ann. Telecommun., Vol.66, No.11-12, pp.663-669, 2011.
    J. Zhao and D. Gu, Provably secure three-party password-based authenticated key exchange protocol, Inf. Sci., Vol.184, pp.310-323, 2012.
    Z. Cheng, M. Nistazakis, R. Comley and L. Vasiu, On the indistinguishability-based security model of key agreement protocolssimple cases, Cryptology ePrint Achieve, 2005.
    M. Manulis, K. Suzuki and B. Ustaoglu, Modeling leakage of ephemeral secrets in tripartite/group key exchange, Proceeding of the 12th international conference on Information security and cryptology (ICISC'09), pp.16-33, 2009.
    F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear pairings and its applications, Proceeding of the Public Key Cryptography (PKC'04), pp.277-290, 2004.
    S. Islam and G. Biswas, A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, Annals of Telecommunications, Vol.67, No.11-12, pp.547-558, 2012.
    Haiyan Sun, On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks, available at https://eprint.iacr.org/2013/030.pdf, 2013-9.
    Qingfeng Cheng, Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, available at https://eprint.iacr. org/2013/006.pdf, 2013-9.
    Zhang Qikun, Li Yuanzhang, Song Danjie and Tan Yuan, Alliance-authentication protocol in clouds computing environment, China Communications, Vol.7, pp.42-54, 2012.
    K.Y. Choi, J.Y. Hwang and D.H. Lee, ID-based authenticated key agreement for low-power mobile devices, ACISP 05, Brisbane, Australia, pp.494-505, 2005.
    J.T. Chung, C.M. Li and T. Hwang, All-in-one group-oriented cryptosystem based on bilinear pairing, Inf. Sci., Vol.177, No.24, pp.5651-5663, 2007.
    Z. Shao, Self-certified signature scheme from pairings, J. Syst. Softw., Vol.80, No.3, pp.388-395, 2007.
    Q. Wang and Z. Cao, Identity based proxy multi-signature, J. Syst. Softw., Vol.80, No.7, pp.1023-1029, 2007.
    Chik How Tan and Joseph Chee Ming Teo, Energy-efficient ID-based group key agreement protocols for wireless networks, 20th International Parallel and Distributed Processing Symposium, 2006-IPDPS, DC, USA, pp.25-29, 2006.
    Xingwen Zhao, Fangguo Zhang and Haibo Tian, Dynamic asymmetric group key agreement for ad hoc networks, Ad Hoc Networks, Vol.9, pp.928-939, 2011.
    Yuh-min Tseng, A secure authenticated group key agreement protocol for resource-limited mobile devices, The Computer Journal, Vol.50, No.1, pp.41-52, 2007.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (513) PDF downloads(1031) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return