Advertisement

One Round Identity-Based Authenticated Conference Key Agreement Protocol

  • Jeung-Seop Kim
  • Hyo-Chul Kim
  • Kyeoung-Ju Ha
  • Kee-Young Yoo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3262)

Abstract

We propose an identity-based authenticated conference key agreement protocol for multi-party. Our protocol is a protocol meeting a lower bound of only one round for multi-party contributory key agreement protocol. The security attributes of our protocol are explained using the security model, and the computational overheads are analyzed as well.

Keywords

Signature Scheme Perfect Forward Secrecy Weil Pairing Cryptology ePrint Archive Corrupt Query 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory (22), 644–654 (1976)Google Scholar
  2. 2.
    Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key distribution systems. Trans. IECE of Japan E69, 99–106 (1986)Google Scholar
  3. 3.
    Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Technical Report CORR 98-05, Department of C & O, University of Waterloo (1988)Google Scholar
  4. 4.
    Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Song, B., Kim, K.: Two-Pass Authenticated Key Agreement Protocol with Key Confirmation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 237–249. Springer, Heidelberg (2000)Google Scholar
  6. 6.
    Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  7. 7.
    Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Al-Riymi, S., Paterson, K.: Authenticated three party key agreement protocols form pairings. Cryptology ePrint Archive, Report 2002/035 (2002)Google Scholar
  9. 9.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  10. 10.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Smart, N.P.: An Identity based authenticated Key Agreement protocol based on the Weil pairing. Electron. Lett. 38(13), 630–632 (2002)MATHCrossRefGoogle Scholar
  12. 12.
    Zhang, F., Liu, S., Kim, K.: ID-based one-round authenticated tripartite key agreement protocol with pairings. Cryptology ePrint Archive, Report 2002/122 (2002)Google Scholar
  13. 13.
    Becker, K., Wille, U.: Communication complexity of group key distribution. In: 5th Conference on Computer and Communications Security, pp. 1–6. ACM Press, New York (1998)CrossRefGoogle Scholar
  14. 14.
    Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transaction on Information Theory 39, 1639–1646 (1993)MATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Frey, G., Ruck, H.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation 62, 865–874 (1994)MATHMathSciNetGoogle Scholar
  16. 16.
    Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  17. 17.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. SCIS 2000C20 (2000)Google Scholar
  18. 18.
    Verheul, E.R.: Self-blindable credential certificates from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533–551. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  19. 19.
    Bellare, M., Rogaway, P.: Entry authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)Google Scholar
  20. 20.
    Bellare, M., Rogaway, P.: Provable secure session key distribution – the three part case. In: Proceedings of the 27th ACM Symposium on the Theory of Computing (1995)Google Scholar
  21. 21.
    Hess, F.: Exponent group signature scheme and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012 (2002)Google Scholar
  22. 22.
    Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie- Hellman key exchange – the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  23. 23.
    Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. In: CCS 2001, pp. 255–264. ACM Press, New York (2001)CrossRefGoogle Scholar
  24. 24.
    Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 321. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jeung-Seop Kim
    • 1
  • Hyo-Chul Kim
    • 2
  • Kyeoung-Ju Ha
    • 3
  • Kee-Young Yoo
    • 1
  1. 1.Computer Engineering Department, E9-508Kyungpook National UniversityPuk-gu, Tae-GuRepublic of Korea
  2. 2.Computer Information MajorKeimyung CollegeDalSeo-gu, Tae-GuRepublic of Korea
  3. 3.Faculty of MultimediaDaegu Haany UniversityGyeongsan-si, GyeongSangBukDoRepublic of Korea

Personalised recommendations