Advertisement

An Efficient Group Key Management Scheme for Web-Based Collaborative Systems

  • Yung-Feng Lu
  • Rong-Sheng Wang
  • Shih-Chun Chou
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 253)

Abstract

Web 2.0 describes a collection of web-based technologies which share a user-focused approach to design and functionality. Under the supporting of Web 2.0 technologies (e.g., HTML5), there are many applications, e.g., seamless reader over equipment, collaborative editing with multiple members, portable multimedia over devices, on browsers become feasible. In one of our previous works, we proposed a two-factor authentication with key agreement scheme for web-based collaborative systems. This paper further extends it to have secure group communication for web-based collaborative systems. With the proposed mechanism, members of the collaborative work could be share their messages easily and co-work securely. In order to provide high efficiency and data confidentiality, this paper presents an efficient group key agreement scheme for group members. The group members can join/leave the group easily.

Keywords

Web-based applications Collaborative systems Key management 

Notes

Acknowledgments

This study is conducted under the “Digital Convergence Service Open Platform” of the Institute for Information Industry which is subsidized by the Ministry of Economy Affairs of the Republic of China. This work was also supported by National Science Council, NSC101-2218-E-025-001.

References

  1. 1.
    Harjono J, Ng G, Kong D, Lo J (2010) building smarter web applications with html5. In: CASCON NJ, USA, p 402–403Google Scholar
  2. 2.
    Lu YF, Lin PH, Chou SC, Wang RS (2012) Multimedia support framework for distributedweb-based collaborative editing. IEEE ISIC, InGoogle Scholar
  3. 3.
    Lautamaki J, Nieminen A, Koskinen J, Aho T, Mikkonen T, Englund M (2012) cored: browser-based collaborative real-time editor for java web applications. In: CSCW, New York, NY, USA, p 1307–1316Google Scholar
  4. 4.
    Yang Y, Zhou J, Wong JW, Bao F (2010) towards practical anonymous password authentication. In: ACMACSAC, New York, NY, USA, p 59–68Google Scholar
  5. 5.
    Yang JH, Chang CC (2009) An id-based remotemutual authentication with key agreement scheme for mobiledevices on elliptic curve cryptosystem. Comput Secur 28(3–4):138–143CrossRefGoogle Scholar
  6. 6.
    Kim HS, Lee SW, Yoo KY (2003) Id-basedpassword authentication scheme using smart cards andfingerprints. SIGOPS Oper Syst Rev. 37(4):32–41CrossRefMathSciNetGoogle Scholar
  7. 7.
    Wan Z, Ren K, Lou W, Preneel B (2008) Anonymous id-based group key agreement forwireless networks. IEEE WCNC, Netw Track, InGoogle Scholar
  8. 8.
    Lu YF, Lin PH, Ye SS, Wang RS, Chou SC (2012) A strong authentication with key agreement scheme for web-based collaborative systems. IEEE ISPACS, InGoogle Scholar
  9. 9.
  10. 10.
    Yacobi Yacov (2002) A note on the bi-linear diffie-hellman assumption. Cryptology ePrintArchive, ReportGoogle Scholar
  11. 11.

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Taichung University of Science and TechnologyTaichungTaiwan
  2. 2.Innovative Digitech-Enabled Application and Services InstituteInstitute for Information IndustryTaipeiTaiwan

Personalised recommendations