Skip to main content
Erschienen in: International Journal of Information Security 5/2017

29.06.2016 | Regular Contribution

Certificateless and identity-based authenticated asymmetric group key agreement

verfasst von: Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi

Erschienen in: International Journal of Information Security | Ausgabe 5/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Group key agreement (GKA) is one of the traditional ways to guarantee the subsequent secure group communications. However, conventional GKA protocols face two limitations, i.e., they require two or more rounds to establish secure channels and are sender restricted. Asymmetric group key agreement (AGKA) eliminates above two limitations of GKA. It allows a group of users to establish a public group encryption key and a different secret decryption key of each group member in one round. Any user who knows the group encryption key can encrypt to the group members. This paper studies authenticated AGKA in certificateless and identity-based public key cryptosystems. We formalize the security model of certificateless authenticated asymmetric group key agreement and realize a one-round certificateless authenticated asymmetric group key agreement protocol to resist active attacks in the real world. We also investigate the relation between certificateless authenticated AGKA and identity-based authenticated AGKA. We propose a concrete conversion from certificateless authenticated AGKA to session key escrow-free identity-based authenticated AGKA.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473 (2003) Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473 (2003)
2.
Zurück zum Zitat Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440–456 (2005) Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440–456 (2005)
4.
Zurück zum Zitat Boyd, C., González-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161–174 (2003) Boyd, C., González-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161–174 (2003)
5.
Zurück zum Zitat Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003) Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003)
6.
Zurück zum Zitat Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115–129 (2004) Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115–129 (2004)
7.
Zurück zum Zitat Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255–264 (2001)MATH Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255–264 (2001)MATH
8.
Zurück zum Zitat Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275–286 (1995) Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275–286 (1995)
9.
Zurück zum Zitat Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130–144 (2004) Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130–144 (2004)
10.
Zurück zum Zitat Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344–359 (2008) Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344–359 (2008)
11.
Zurück zum Zitat Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefMATH Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefMATH
12.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2506573 Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.​1109/​TPDS.​2015.​2506573
13.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)CrossRef
14.
Zurück zum Zitat Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537–554 (1999) Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537–554 (1999)
15.
Zurück zum Zitat Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1–17 (2013) Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1–17 (2013)
16.
Zurück zum Zitat Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308–322 (2007) Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308–322 (2007)
17.
Zurück zum Zitat Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180–189 (2005) Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180–189 (2005)
18.
Zurück zum Zitat Langlois, A., Stehlé, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239–256 (2014) Langlois, A., Stehlé, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239–256 (2014)
19.
Zurück zum Zitat Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)MathSciNetCrossRefMATH Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317–323 (2015) Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317–323 (2015)
21.
Zurück zum Zitat Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto’84, LNCS, vol. 196, pp. 47–53 (1984) Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto’84, LNCS, vol. 196, pp. 47–53 (1984)
22.
Zurück zum Zitat Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012) Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012)
23.
Zurück zum Zitat Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153–170 (2009) Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153–170 (2009)
24.
Zurück zum Zitat Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143–160 (2011) Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143–160 (2011)
25.
Zurück zum Zitat Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE/ACM Trans. Netw. 21(2), 621–633 (2013)CrossRef Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE/ACM Trans. Netw. 21(2), 621–633 (2013)CrossRef
26.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)CrossRef
27.
Zurück zum Zitat Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)CrossRef Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)CrossRef
28.
Zurück zum Zitat Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510–519 (2010) Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510–519 (2010)
29.
Zurück zum Zitat Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)CrossRef Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)CrossRef
30.
Zurück zum Zitat Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182–195 (2015) Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182–195 (2015)
31.
Zurück zum Zitat Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239–254 (2014) Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239–254 (2014)
32.
Zurück zum Zitat Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496–510 (2014) Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496–510 (2014)
33.
Zurück zum Zitat Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi:10.1109/TC.2015.2485225 MATH Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi:10.​1109/​TC.​2015.​2485225 MATH
34.
Zurück zum Zitat Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRef Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRef
35.
Zurück zum Zitat Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi:10.1109/TITS.2016.2579162 Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi:10.​1109/​TITS.​2016.​2579162
Metadaten
Titel
Certificateless and identity-based authenticated asymmetric group key agreement
verfasst von
Lei Zhang
Qianhong Wu
Bo Qin
Hua Deng
Jiangtao Li
Jianwei Liu
Wenchang Shi
Publikationsdatum
29.06.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 5/2017
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-016-0339-8

Weitere Artikel der Ausgabe 5/2017

International Journal of Information Security 5/2017 Zur Ausgabe

Premium Partner