Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement
Asymmetric group key agreement allows a group of members to establish a public group encryption key while each member has a different secret decryption key. Knowing the group encryption key, a sender can encrypt to the group members so that only the members can decrypt. This paper studies authenticated asymmetric group key agreement in certificateless public key cryptography. We formalize the security model of certificateless authenticated asymmetric group key agreement and capture typical attacks in the real world. We next present a strongly unforgeable stateful certificateless batch multi-signature scheme as building block and realize a one-round certificatless authenticated asymmetric group key agreement protocol to resist active attacks. Both the new multi-signature scheme and the resulting group key agreement protocol are shown to be secure under the well-established computational Diffie-Hellman and the k-Bilinear Diffie-Hellman exponent assumptions in the random oracle model, respectively.
KeywordsCertificateless public key cryptography group key agreement asymmetric group key agreement
Unable to display preview. Download preview PDF.
- 5.Boyd, C., Mathuria, A.: Protocols for authentication and key establishment, pp. 9–10. Springer (2003) ISBN:3-540-43107-1Google Scholar
- 7.Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. In: ACM CCS 2001, pp. 255–264 (2001)Google Scholar
- 15.Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. In: ACM CCS 2005, pp. 180–189 (2005)Google Scholar
- 16.Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal of Computer Mathematics (2013), http://dx.doi.org/10.1080/00207160.2013.806653
- 18.Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Transactions on Internet and Information Systems 6(12) (2012)Google Scholar