Abstract
Asymmetric group key agreement allows a group of users to negotiate a common public encryption key, and each user only holds his own secret encryption key. Authenticated asymmetric group key agreement (AAGKA) protocol is a kind of AGKA protocols which can be secure against active attacks. Dynamic asymmetric group key agreement allows any member to join and leave at any point. This paper studies dynamic AAGKA in certificateless cryptography. We first pointed that Wei et al.’s dynamic certificateless AAGKA protocol suffers from a key compromise impersonation attack, and cannot provide secrecy or forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053443
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, USA, pp. 255–264 (2001)
Choi, K.Y., Hwang, J.Y., Lee, D.H.: Efficient ID-based group key agreement with bilinear maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 130–144. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24632-9_10
Anitha Kumari, K., Sudha Sadasivam, G.: Two-server 3D ElGamal Diffie-Hellman password authenticated and key exchange protocol using geometrical properties. Mob. Netw. Appl. 24(3), 1104–1119 (2019)
Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_9
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Zhang, L., Wu, Q. H., Qin, B.: Authenticated asymmetric group key agreement protocol and its application. In: Proceedings of the International Communications Conference, Cape Town, South Africa, pp. 1–5 (2010)
Zhang, L., Wu, Q.H., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)
Wu, Q.H., Zhang, X.Y., Tang, M., Yin, P., Qiu, Z.: Extended asymmetric group key agreement for dynamic groups and its applications. China Commun. 8(04), 32–40 (2011)
Zhao, X., Zhang, F., Tian, H.: Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Netw. 9(5), 928–939 (2010)
Lv, X.X., Li, H., Wang, B.C.: Group key agreement for secure group communication in dynamic peer systems. J. Parallel Distrib. Comput. 72(10), 1195–1200 (2012)
Li, J.T., Zhang, L.: Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. Inf. Sci. 414, 187–202 (2017)
Zhang, L., Wu, Q.H., Domingo-Ferrer, J., Qin, B., Dong, Z.M.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(1), 2352–2364 (2015)
Wei, G.Y., Yang, X.B., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012)
Karati, A., Islam, S.H., Biswas, G.P.: A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450, 378–391 (2018)
Schnorr, C.P.: Efficient identification and signatures for smart cards. J. Cryptol. 4, 161–174 (1991)
Funding
This work is supported by National Natural Science Foundation of China (No. 61502436, 61672471), Science and Technology Program of Henan Province (No. 172102210060), Plan for Scientific Innovation Talent of Henan Province (No. 184200510010), Program for Innovative Research Team in Science and Technology in University of Henan Province (No. 18IRTSTHN012) and Doctor Fund Project of Zhengzhou University of Light Industry (No. 2014BSJJ081).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sun, H., Li, L., Zhang, J., Huang, W. (2020). An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trusted KGC. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_16
Download citation
DOI: https://doi.org/10.1007/978-981-15-7530-3_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7529-7
Online ISBN: 978-981-15-7530-3
eBook Packages: Computer ScienceComputer Science (R0)