Advanced Search
Volume 28 Issue 2
Aug.  2010
Turn off MathJax
Article Contents
Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.
Citation: Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.

A Pairing-Based Group Key Agreement Protocol and Its Analysis

  • Received Date: 2004-07-12
  • Rev Recd Date: 2005-01-08
  • Publish Date: 2006-02-19
  • This paper proposes a pairing-based group key agreement protocol based on Shims certification-based tripartite key agreement protocol. This protocol adopts a pseudo-random sequence to avoid the unknown key-share attack and the known-key attack. Some attacks described in the literatures are presented, which proved infeasible in the protocol. And this protocol can achieves the forward security and backward security, when a dynamic group performs it.
  • loading
  • Bresson E, Chevassut O, Pointcheval D. Provably authenticated group Diffie-Hellman key exchange- the dynamic case, In C.Boyd, editor, Advances in Crytology-Proceedings of AsiaCrypt 2001, Springer-Verlag LNCS Vo1.2248, 2001: 290一309.[2]Pereira O. Modelling and security analysis of authenticated group key agreement protocols, PhD thesis. Universite Catholique de Louvain, 2003[3]Joux A. A one-round protocol for tripartite Dittie-Hellman,Algorithm Number Theory Symposium一ANTS-IV, Lecture Notes in Computer Science, 1838, Springer-Verlag, 2000:385一394.[4]Shim K. Efficient one-round tripartite authenticated key agreement protocol from the Weil pairing. Electronics Letters 2003, (39): 208一209.[5]Ateniese Giuseppe, Steiner Michael, Tsudik Gene. New multiparty authentication services and key agreement protocols.IEEE J on Selected Areas in Communications, 2000, 18(4).[6]Michael Steiner, Gene Tsudik, Michael Waidner. Key agreement in dynamic peer Groups[J].IEEE Trans. on Parallel and Distributed Systems.2000, 11(8):769-[7]Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology一Crypto' 2001, Lecture Notes in Computer Science Vo1.2139, Springer-Verlag, 2001: 213一229.[8]AI-Riyami S S, Paterson K Q Tripartite; authenticated key agreement protocols from pairings. IIVIA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2898, Springer-Verlag, 2003: 332一359.[9]Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. the Sixth IMA International Conference on Cryptography and Coding, Cirencester, England,1997: 30一45.[10]Boneh D, Silverberg A. Applications of multilinear forms to cryptography, Contemporary Mathematics 324, American Mathematical Society, 2003: 71一90.[11]Chao-Wen Chan, Chin-Chen Chang. Key exchange protocols for multiparty communication services. Proceedings of the First International Symposium on Cyber Worlds (CW.02), IEEE, 2002:241一248.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2394) PDF downloads(638) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return