Abstract
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.
Similar content being viewed by others
References
Shamir A. Identity-Based Cryptosystems and Signature Schemes[C]//Proc of Crypto’84, Santa Barbara, LNCS 196. Berlin: Springer-Verlag, 1985: 47–53.
Al-Riyami S, Paterson K. Certificateless Public Key Cryptography[C]//Proc of Asiacrypt’03, Taipei, LNCS 2894. Berlin: Springer-Verlag, 2003:205–217.
Nalla D, Reddy C. Identity Based Authenticated Group Key Exchange Protocol[C]//Proc of Indocrypt’02, Hyderabad, LNCS 2551. Berlin: Springer-Verlager, 2002: 215–233.
Barua R, Dutta R, Sarkar P. Extending Joux’s Protocol to Multi Party Key Exchange[C]//Proc of Indocrypt’03, New Delhi, LNCS 2904. Berlin: Springer-Verlag, 2003:205–217.
Choi K, Hwang J, Lee D. Efficient ID-Based Group Key Exchange with Bilinear Maps[C]//Proc of PKC’04, Singapore, LNCS 2947. Berlin: Springer-Verlag, 2004: 130–144.
Burmester M, Desmedt Y. A Secure and Efficient Conference Key Distribution System[C]//Proc of Eurocrypt’94, Perugia, LNCS 950. Berlin: Springer-Verlag, 1994: 267–275.
Zhang F, Chen X. Attack on an ID-based Authenticated Group Key Exchange Scheme from PKC 2004[J]. Information Processing Letters, 2004, 91(4): 191–193.
Pieprzyk J, Li C. Multiparty Key Agreement Protocols[J]. IEE Proceedings of Computers and Digital Techniques, 2000, 147(4): 229–236.
Tzeng W. A Secure Fault-Tolerant Conference-Key Exchange Protocol[J]. IEEE Transactions on Computers, 2002, 51(4): 373–379.
Bresson E, Chevassut O, Pointcheval D, et al. Provably Authenticated Group Diffie-Hellman Key Exchange[C]// Proc of ACM CCS’01. Philadelphia: ACM Press, 2001:255–264.
Shim K. Efficient ID-Based Authenticated Key Exchange Protocol Based on Weil Pairing[J]. Electronics Letters, 2003, 39(8):653–654.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90204012, 60573035, 60573036) and the University IT Research Center Project of Korea
Biography: CAO Chunjie (1977–), male, Ph.D. candidate, research direction: information security and cryptography
Rights and permissions
About this article
Cite this article
Cao, C., Ma, J. & Moon, S. Provable efficient certificateless group key exchange protocol. Wuhan Univ. J. of Nat. Sci. 12, 41–45 (2007). https://doi.org/10.1007/s11859-006-0167-1
Received:
Issue Date:
DOI: https://doi.org/10.1007/s11859-006-0167-1