Skip to main content
Erschienen in: Annals of Telecommunications 11-12/2011

01.12.2011

A novel authenticated group key agreement protocol for mobile environment

verfasst von: Jia-Lun Tsai

Erschienen in: Annals of Telecommunications | Ausgabe 11-12/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An authenticated group key agreement protocol allows a group of parties to authenticate each other and then determine a group key via an insecure network environment. In 2009, Lee et al. first adopted bilinear pairings to propose a new nonauthenticated group key agreement protocol and then extend it to an authenticated group key agreement protocol. This paper points out that the authenticated protocol of Lee et al. is vulnerable to an impersonation attack such that any adversary can masquerade as a legal node to determine a group key with the other legal nodes and the powerful node. This paper shall employ the short signature scheme of Zhang et al. to propose a new authenticated group key agreement protocol. The short signature scheme of Zhang et al. is proven to be secure against the adaptive chosen-message attacks in the random oracle model, so the proposed protocol can withstand the possible attacks. Besides, compared with the authenticated protocol of Lee et al., the proposed protocol is more secure and efficient.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hwang MS, Yang WP (1995) Conference key distribution protocols for digital mobile communication systems. IEEE J Sel Areas Commun 13:416–420CrossRef Hwang MS, Yang WP (1995) Conference key distribution protocols for digital mobile communication systems. IEEE J Sel Areas Commun 13:416–420CrossRef
3.
Zurück zum Zitat Tseng YM (2002) Cryptanalysis and improvement of key distribution system for VSAT satellite communications. Informatica 13(3):369–376MATHMathSciNet Tseng YM (2002) Cryptanalysis and improvement of key distribution system for VSAT satellite communications. Informatica 13(3):369–376MATHMathSciNet
4.
Zurück zum Zitat Tseng YM (2003) A scalable key management scheme with minimizing key storage for secure group communications. Int J Netw Manag 13(6):419–425CrossRef Tseng YM (2003) A scalable key management scheme with minimizing key storage for secure group communications. Int J Netw Manag 13(6):419–425CrossRef
5.
Zurück zum Zitat Beller MJ, Yacobi Y (1993) Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electron Lett 29:999–1001CrossRef Beller MJ, Yacobi Y (1993) Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electron Lett 29:999–1001CrossRef
6.
Zurück zum Zitat Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007–2025CrossRefMathSciNet Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007–2025CrossRefMathSciNet
7.
Zurück zum Zitat Lin I-C, Chang C-C, Hwang M-S (2000) Security enhancement for the simple authentication key agreement algorithm. In: The twenty-fourth annual international computer software and applications conference (COMPSAC)’2000, pp 113–115 Lin I-C, Chang C-C, Hwang M-S (2000) Security enhancement for the simple authentication key agreement algorithm. In: The twenty-fourth annual international computer software and applications conference (COMPSAC)’2000, pp 113–115
8.
Zurück zum Zitat Tseng YM (2005) A robust multi-party key agreement protocol resistant to malicious participants. Comput J 48(4):480–487CrossRef Tseng YM (2005) A robust multi-party key agreement protocol resistant to malicious participants. Comput J 48(4):480–487CrossRef
9.
Zurück zum Zitat Bresson E, Chevassut O, Essiari A, Pointcheval D (2003) Mutual authentication and group key agreement for low-power mobile devices, in Proc. of the 5th IFIP-TC6 International Conference on Mobile and Wireless Communications Networks (MWCN’03), pp 59–62 Bresson E, Chevassut O, Essiari A, Pointcheval D (2003) Mutual authentication and group key agreement for low-power mobile devices, in Proc. of the 5th IFIP-TC6 International Conference on Mobile and Wireless Communications Networks (MWCN’03), pp 59–62
10.
Zurück zum Zitat Bresson E, Chevassut O, Essiari A, Pointcheval D (2004) Mutual authentication and group key agreement for low-power mobile devices. Comput Commun 27(7):1730–1737CrossRef Bresson E, Chevassut O, Essiari A, Pointcheval D (2004) Mutual authentication and group key agreement for low-power mobile devices. Comput Commun 27(7):1730–1737CrossRef
12.
Zurück zum Zitat Nam J, Kim S, Won D (2005) A weakness in the Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme for low-power mobile devices. IEEE Commun Lett 9:429–431CrossRef Nam J, Kim S, Won D (2005) A weakness in the Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme for low-power mobile devices. IEEE Commun Lett 9:429–431CrossRef
13.
Zurück zum Zitat Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78(1):73–83CrossRef Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78(1):73–83CrossRef
14.
Zurück zum Zitat Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Proceedings of advances in Cryptology-Crypto’03, pp 110–125 Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Proceedings of advances in Cryptology-Crypto’03, pp 110–125
15.
Zurück zum Zitat Tseng YM (2007) A resource-constrained group key agreement protocol for imbalanced wireless networks. Comput Secur 26(4):331–337CrossRef Tseng YM (2007) A resource-constrained group key agreement protocol for imbalanced wireless networks. Comput Secur 26(4):331–337CrossRef
16.
Zurück zum Zitat Lee CC, Lim TH, Tsai CS (2009) A new authenticated group key agreement in a mobile environment. Ann Telecommun 64(11–12):735–744CrossRef Lee CC, Lim TH, Tsai CS (2009) A new authenticated group key agreement in a mobile environment. Ann Telecommun 64(11–12):735–744CrossRef
17.
Zurück zum Zitat Zhang F, Safavi-Naini R, Susilo W (2004) An efficient signature scheme from bilinear pairings and its applications. Public Key Cryptography–PKC 2004, Singapore. LNCS, Springer, pp. 277–290. Zhang F, Safavi-Naini R, Susilo W (2004) An efficient signature scheme from bilinear pairings and its applications. Public Key Cryptography–PKC 2004, Singapore. LNCS, Springer, pp. 277–290.
18.
Zurück zum Zitat Awasthi AK, Lal S (2007) Id-based ring signature and proxy ring signature schemes from bilinear pairings. Int J Netw Secur 4(2):187–192 Awasthi AK, Lal S (2007) Id-based ring signature and proxy ring signature schemes from bilinear pairings. Int J Netw Secur 4(2):187–192
19.
Zurück zum Zitat Chen L, Kudla C (2003) Identity based authenticated key agreement protocols from pairings. In: Kudla C (ed) Computer security foundations workshop. IEEE; pp 219–33 Chen L, Kudla C (2003) Identity based authenticated key agreement protocols from pairings. In: Kudla C (ed) Computer security foundations workshop. IEEE; pp 219–33
20.
Zurück zum Zitat Hölbl M, Welzer T, Brumen B (2010) Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput Secur 29(2):244–252CrossRef Hölbl M, Welzer T, Brumen B (2010) Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput Secur 29(2):244–252CrossRef
21.
Zurück zum Zitat Chung JT, Li CM, Hwang T (2007) All-in-one group-oriented cryptosystem based on bilinear pairing. Inf Sci 177(24):5651–5663CrossRefMATHMathSciNet Chung JT, Li CM, Hwang T (2007) All-in-one group-oriented cryptosystem based on bilinear pairing. Inf Sci 177(24):5651–5663CrossRefMATHMathSciNet
22.
Zurück zum Zitat Shao Z (2007) Self-certified signature scheme from pairings. J Syst Softw 80(3):388–395CrossRef Shao Z (2007) Self-certified signature scheme from pairings. J Syst Softw 80(3):388–395CrossRef
23.
Zurück zum Zitat Wang Q, Cao Z (2007) Identity based proxy multi-signature. J Syst Softw 80(7):1023–1029CrossRef Wang Q, Cao Z (2007) Identity based proxy multi-signature. J Syst Softw 80(7):1023–1029CrossRef
24.
Zurück zum Zitat Boneh D, Franklin M (2001) Identity based encryption from the weil pairing. In: Advances in Cryptology-Crypto’2001. LNCS, vol 2139, pp 213–229 Boneh D, Franklin M (2001) Identity based encryption from the weil pairing. In: Advances in Cryptology-Crypto’2001. LNCS, vol 2139, pp 213–229
25.
Zurück zum Zitat Tsai J-L (2009) Convertible multi-authenticated encryption scheme with one-way hash function. Comput Commun 32(5):783–786CrossRef Tsai J-L (2009) Convertible multi-authenticated encryption scheme with one-way hash function. Comput Commun 32(5):783–786CrossRef
26.
Zurück zum Zitat Tsai J-L, Wu T-C, Tsai K-Y (2010) A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks. J Zhejiang Univ Sci C Comput Electron 11(4):290–295CrossRefMathSciNet Tsai J-L, Wu T-C, Tsai K-Y (2010) A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks. J Zhejiang Univ Sci C Comput Electron 11(4):290–295CrossRefMathSciNet
27.
Zurück zum Zitat Blake-Wilson S, Menezes A (1999) Unknown key-share attacks on the station-to-station (STS) protocol. Public Key Cryptography, LNCS, 1560, Springer, pp 154–170 Blake-Wilson S, Menezes A (1999) Unknown key-share attacks on the station-to-station (STS) protocol. Public Key Cryptography, LNCS, 1560, Springer, pp 154–170
28.
Zurück zum Zitat Barreto PSLM, Kim HY, Lynn B, Scott M (2002) Efficient algorithms for pairing-based cryptosystems. In: Advances in Cryptology–Crypto 2002. LNCS 2442. USA: Springer; pp 354–368 Barreto PSLM, Kim HY, Lynn B, Scott M (2002) Efficient algorithms for pairing-based cryptosystems. In: Advances in Cryptology–Crypto 2002. LNCS 2442. USA: Springer; pp 354–368
Metadaten
Titel
A novel authenticated group key agreement protocol for mobile environment
verfasst von
Jia-Lun Tsai
Publikationsdatum
01.12.2011
Verlag
Springer-Verlag
Erschienen in
Annals of Telecommunications / Ausgabe 11-12/2011
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-011-0241-3

Weitere Artikel der Ausgabe 11-12/2011

Annals of Telecommunications 11-12/2011 Zur Ausgabe

Premium Partner