A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN
Abstract
In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member’s input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased computation cost, due to extra public key operations, and a similar communication cost. We also show in which practical setting the protocol can be deployed.
Keywords
Privacy Group key agreement ID-based cryptographyPreview
Unable to display preview. Download preview PDF.
References
- 1.Wan, Z., Ren, K., Lou, W., Preneel, B.: Anonymous id-based group key agreement for wireless networks. In: IEEE WCNC, Network Track (2008)Google Scholar
- 2.Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
- 3.Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32, 586 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
- 4.Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, pp. 26–28 (2000)Google Scholar
- 5.Dutta, R., Dowling, T.: Secure and efficient group key agreements for cluster based networks. Transactions on Computational Science 4, 87–116 (2009)zbMATHGoogle Scholar
- 6.Dutta, R., Barua, R.: Overview of key agreement protocols. Cryptology ePrint Archive, Report 2005/289 (2005), http://eprint.iacr.org/
- 7.Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
- 8.Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 38(13), 630–632 (2002)CrossRefzbMATHGoogle Scholar
- 9.Jung, B.E.: An efficient group key agreement protocol. IEEE Communications Letters 10(2), 106–107 (2006)CrossRefGoogle Scholar
- 10.Brown, D.: Standards for efficient cryptography, SEC 1: elliptic curve cryptography. Technical report, Certicom Research (2009)Google Scholar
- 11.Hoebeke, J.: Adaptive Ad Hoc Routing and Its Application to Virtual Private Ad Hoc Networks. PhD thesis, Universiteit Gent (2007)Google Scholar
- 12.Hoebeke, J., Holderbeke, G., Moerman, I., Dhoedt, B., Demeester, P.: Virtual Private Ad Hoc Networking. Wireless Personal Communications 38(1), 125–141 (2006)CrossRefGoogle Scholar