Skip to main content
Log in

Certificateless and identity-based authenticated asymmetric group key agreement

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Group key agreement (GKA) is one of the traditional ways to guarantee the subsequent secure group communications. However, conventional GKA protocols face two limitations, i.e., they require two or more rounds to establish secure channels and are sender restricted. Asymmetric group key agreement (AGKA) eliminates above two limitations of GKA. It allows a group of users to establish a public group encryption key and a different secret decryption key of each group member in one round. Any user who knows the group encryption key can encrypt to the group members. This paper studies authenticated AGKA in certificateless and identity-based public key cryptosystems. We formalize the security model of certificateless authenticated asymmetric group key agreement and realize a one-round certificateless authenticated asymmetric group key agreement protocol to resist active attacks in the real world. We also investigate the relation between certificateless authenticated AGKA and identity-based authenticated AGKA. We propose a concrete conversion from certificateless authenticated AGKA to session key escrow-free identity-based authenticated AGKA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473 (2003)

  2. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440–456 (2005)

  3. Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemp. Math. 324, 71–90 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  4. Boyd, C., González-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161–174 (2003)

  5. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003)

  6. Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115–129 (2004)

  7. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255–264 (2001)

    MATH  Google Scholar 

  8. Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275–286 (1995)

  9. Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130–144 (2004)

  10. Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344–359 (2008)

  11. Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  12. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2506573

    Google Scholar 

  13. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Article  Google Scholar 

  14. Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537–554 (1999)

  15. Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1–17 (2013)

  16. Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308–322 (2007)

  17. Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180–189 (2005)

    Google Scholar 

  18. Langlois, A., Stehlé, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239–256 (2014)

  19. Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  20. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317–323 (2015)

    Google Scholar 

  21. Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto’84, LNCS, vol. 196, pp. 47–53 (1984)

  22. Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012)

    Google Scholar 

  23. Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153–170 (2009)

  24. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143–160 (2011)

  25. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE/ACM Trans. Netw. 21(2), 621–633 (2013)

    Article  Google Scholar 

  26. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)

    Article  Google Scholar 

  27. Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)

    Article  Google Scholar 

  28. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510–519 (2010)

  29. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)

    Article  Google Scholar 

  30. Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182–195 (2015)

  31. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239–254 (2014)

  32. Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496–510 (2014)

  33. Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi:10.1109/TC.2015.2485225

    MATH  Google Scholar 

  34. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)

    Article  Google Scholar 

  35. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi:10.1109/TITS.2016.2579162

    Google Scholar 

Download references

Acknowledgments

This paper is supported by the Natural Science Foundation of China through projects 61572198, 61321064, 61370190, 61272501, 61472429, 61532021; by the Science and Technology Commission of Shanghai Municipality 13JC1403502.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, L., Wu, Q., Qin, B. et al. Certificateless and identity-based authenticated asymmetric group key agreement. Int. J. Inf. Secur. 16, 559–576 (2017). https://doi.org/10.1007/s10207-016-0339-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-016-0339-8

Keywords

Navigation