A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN

  • Yoni De Mulder
  • Karel Wouters
  • Bart Preneel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6543)

Abstract

In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member’s input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased computation cost, due to extra public key operations, and a similar communication cost. We also show in which practical setting the protocol can be deployed.

Keywords

Privacy Group key agreement ID-based cryptography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wan, Z., Ren, K., Lou, W., Preneel, B.: Anonymous id-based group key agreement for wireless networks. In: IEEE WCNC, Network Track (2008)Google Scholar
  2. 2.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32, 586 (2003)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, pp. 26–28 (2000)Google Scholar
  5. 5.
    Dutta, R., Dowling, T.: Secure and efficient group key agreements for cluster based networks. Transactions on Computational Science 4, 87–116 (2009)MATHGoogle Scholar
  6. 6.
    Dutta, R., Barua, R.: Overview of key agreement protocols. Cryptology ePrint Archive, Report 2005/289 (2005), http://eprint.iacr.org/
  7. 7.
    Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  8. 8.
    Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electronics Letters 38(13), 630–632 (2002)CrossRefMATHGoogle Scholar
  9. 9.
    Jung, B.E.: An efficient group key agreement protocol. IEEE Communications Letters 10(2), 106–107 (2006)CrossRefGoogle Scholar
  10. 10.
    Brown, D.: Standards for efficient cryptography, SEC 1: elliptic curve cryptography. Technical report, Certicom Research (2009)Google Scholar
  11. 11.
    Hoebeke, J.: Adaptive Ad Hoc Routing and Its Application to Virtual Private Ad Hoc Networks. PhD thesis, Universiteit Gent (2007)Google Scholar
  12. 12.
    Hoebeke, J., Holderbeke, G., Moerman, I., Dhoedt, B., Demeester, P.: Virtual Private Ad Hoc Networking. Wireless Personal Communications 38(1), 125–141 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yoni De Mulder
    • 1
  • Karel Wouters
    • 1
  • Bart Preneel
    • 1
  1. 1.Dept. Electrical Engineering-ESAT/SCD/IBBT-COSICKatholieke Universiteit LeuvenHeverleeBelgium

Personalised recommendations