• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Qikun, Wang Ruifang, Tan Yu'an. Identity-Based Authenticated Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2014, 51(8): 1727-1738. DOI: 10.7544/issn1000-1239.2014.20121165
Citation: Zhang Qikun, Wang Ruifang, Tan Yu'an. Identity-Based Authenticated Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2014, 51(8): 1727-1738. DOI: 10.7544/issn1000-1239.2014.20121165

Identity-Based Authenticated Asymmetric Group Key Agreement

More Information
  • Published Date: August 14, 2014
  • The asymmetric group key agreement (AGKA) protocol enables external users to securely send messages to group members. With the development of large-scale collaborative computing in distributed network, the members who participate in collaborative computing may come from different domains, different time zones and different cloud ends networks. Existing AGKA can not meet the security of information exchange among group members that come from cross-domain or heterogeneous network, and it is only secure against passive attacks which are too weak to capture the attacks in the real world. In this paper, we formalize an active security model for identity-based authentication asymmetric group key agreement (IB-AAGKA) protocol. Our protocol achieves an asymmetric group key agreement only one round, to resolve the problem that is hard to find a trusted party to serve as a dealer in a regular broadcast scheme, and is inconvenient to require all the parties in differences time zones to stay online concurrently to implement a (two-round or multi-round) regular GKA protocol. Our protocol can also achieve anonymous authentication. It supports the dynamic group key update of nodes for forward secrecy and backward secrecy of group key. Our protocol is proven secure under the decisional bilinear Diffie-Hellman (DBDH) problem assumption, and the performance analysis show that the proposed scheme is highly efficient.
  • Related Articles

    [1]Tang Yongli, Li Ying, Zhao Zongqu, Li Xingyu, Wang Hanbo. Traceable Anonymous Single Sign on Scheme on Lattice[J]. Journal of Computer Research and Development, 2023, 60(6): 1417-1430. DOI: 10.7544/issn1000-1239.202111235
    [2]Hou Wanyu, Sun Yu, Li Dawei, Cui Jian, Guan Zhenyu, Liu Jianwei. Anonymous Authentication and Key Agreement Protocol for 5G-V2V Based on PUF[J]. Journal of Computer Research and Development, 2021, 58(10): 2265-2277. DOI: 10.7544/issn1000-1239.2021.20210486
    [3]Zhou Zhibin, Wang Guojun, Liu Qin, Jia Weijia. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification[J]. Journal of Computer Research and Development, 2018, 55(12): 2674-2684. DOI: 10.7544/issn1000-1239.2018.20170787
    [4]Zhang Qikun, Gan Yong, Wang Ruifang, Zheng Jiamin, Tan Yu’an. Inter-Cluster Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2018, 55(12): 2651-2663. DOI: 10.7544/issn1000-1239.2018.20170651
    [5]Chen Ming. Strongly Secure Anonymous Implicit Authentication and Key Agreement for Roaming Service[J]. Journal of Computer Research and Development, 2017, 54(12): 2772-2784. DOI: 10.7544/issn1000-1239.2017.20160485
    [6]Chang Fen, Cui Jie, Wang Liangmin. A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020. DOI: 10.7544/issn1000-1239.2017.20160635
    [7]Wan Tao, Liu Zunxiong, Ma Jianfeng. Authentication and Key Agreement Protocol for Multi-Server Architecture[J]. Journal of Computer Research and Development, 2016, 53(11): 2446-2453. DOI: 10.7544/issn1000-1239.2016.20150107
    [8]Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie. Towards Measuring Unobservability in Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2015, 52(10): 2373-2381. DOI: 10.7544/issn1000-1239.2015.20150562
    [9]Zhou Yanwei, Yang Qiliang, Yang Bo, Wu Zhenqiang. A Tor Anonymous Communication System with Security Enhancements[J]. Journal of Computer Research and Development, 2014, 51(7): 1538-1546.
    [10]Zhang Yang. Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs[J]. Journal of Computer Research and Development, 2008, 45(7): 1142-1150.

Catalog

    Article views (1492) PDF downloads (703) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return