Skip to main content
Log in

Provable efficient certificateless group key exchange protocol

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-Based Cryptosystems and Signature Schemes[C]//Proc of Crypto’84, Santa Barbara, LNCS 196. Berlin: Springer-Verlag, 1985: 47–53.

    Google Scholar 

  2. Al-Riyami S, Paterson K. Certificateless Public Key Cryptography[C]//Proc of Asiacrypt’03, Taipei, LNCS 2894. Berlin: Springer-Verlag, 2003:205–217.

    Google Scholar 

  3. Nalla D, Reddy C. Identity Based Authenticated Group Key Exchange Protocol[C]//Proc of Indocrypt’02, Hyderabad, LNCS 2551. Berlin: Springer-Verlager, 2002: 215–233.

    Google Scholar 

  4. Barua R, Dutta R, Sarkar P. Extending Joux’s Protocol to Multi Party Key Exchange[C]//Proc of Indocrypt’03, New Delhi, LNCS 2904. Berlin: Springer-Verlag, 2003:205–217.

    Google Scholar 

  5. Choi K, Hwang J, Lee D. Efficient ID-Based Group Key Exchange with Bilinear Maps[C]//Proc of PKC’04, Singapore, LNCS 2947. Berlin: Springer-Verlag, 2004: 130–144.

    Google Scholar 

  6. Burmester M, Desmedt Y. A Secure and Efficient Conference Key Distribution System[C]//Proc of Eurocrypt’94, Perugia, LNCS 950. Berlin: Springer-Verlag, 1994: 267–275.

    Google Scholar 

  7. Zhang F, Chen X. Attack on an ID-based Authenticated Group Key Exchange Scheme from PKC 2004[J]. Information Processing Letters, 2004, 91(4): 191–193.

    Article  Google Scholar 

  8. Pieprzyk J, Li C. Multiparty Key Agreement Protocols[J]. IEE Proceedings of Computers and Digital Techniques, 2000, 147(4): 229–236.

    Article  Google Scholar 

  9. Tzeng W. A Secure Fault-Tolerant Conference-Key Exchange Protocol[J]. IEEE Transactions on Computers, 2002, 51(4): 373–379.

    Article  Google Scholar 

  10. Bresson E, Chevassut O, Pointcheval D, et al. Provably Authenticated Group Diffie-Hellman Key Exchange[C]// Proc of ACM CCS’01. Philadelphia: ACM Press, 2001:255–264.

    Google Scholar 

  11. Shim K. Efficient ID-Based Authenticated Key Exchange Protocol Based on Weil Pairing[J]. Electronics Letters, 2003, 39(8):653–654.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ma Jianfeng.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90204012, 60573035, 60573036) and the University IT Research Center Project of Korea

Biography: CAO Chunjie (1977–), male, Ph.D. candidate, research direction: information security and cryptography

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cao, C., Ma, J. & Moon, S. Provable efficient certificateless group key exchange protocol. Wuhan Univ. J. of Nat. Sci. 12, 41–45 (2007). https://doi.org/10.1007/s11859-006-0167-1

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-006-0167-1

Key words

CLC number

Navigation