Skip to main content
Top
Published in: International Journal of Information Security 5/2017

29-06-2016 | Regular Contribution

Certificateless and identity-based authenticated asymmetric group key agreement

Authors: Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi

Published in: International Journal of Information Security | Issue 5/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Group key agreement (GKA) is one of the traditional ways to guarantee the subsequent secure group communications. However, conventional GKA protocols face two limitations, i.e., they require two or more rounds to establish secure channels and are sender restricted. Asymmetric group key agreement (AGKA) eliminates above two limitations of GKA. It allows a group of users to establish a public group encryption key and a different secret decryption key of each group member in one round. Any user who knows the group encryption key can encrypt to the group members. This paper studies authenticated AGKA in certificateless and identity-based public key cryptosystems. We formalize the security model of certificateless authenticated asymmetric group key agreement and realize a one-round certificateless authenticated asymmetric group key agreement protocol to resist active attacks in the real world. We also investigate the relation between certificateless authenticated AGKA and identity-based authenticated AGKA. We propose a concrete conversion from certificateless authenticated AGKA to session key escrow-free identity-based authenticated AGKA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473 (2003) Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473 (2003)
2.
go back to reference Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440–456 (2005) Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, LNCS, vol. 3494, pp. 440–456 (2005)
4.
go back to reference Boyd, C., González-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161–174 (2003) Boyd, C., González-Nieto, J.: Round-optimal contributory conference key agreement. In: PKC 2003, LNCS, vol. 2567, pp. 161–174 (2003)
5.
go back to reference Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003) Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer. ISBN:3-540-43107-1. 9, 10 (2003)
6.
go back to reference Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115–129 (2004) Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: PKC 2004, LNCS, vol. 2947, pp. 115–129 (2004)
7.
go back to reference Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255–264 (2001)MATH Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group Diffie-Hellman key exchange. ACM CCS 2001, 255–264 (2001)MATH
8.
go back to reference Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275–286 (1995) Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: EUROCRYPT 1994, LNCS, vol. 950, pp. 275–286 (1995)
9.
go back to reference Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130–144 (2004) Choi, K., Hwang, J., Lee, D.: Efficient ID-based group key agreement with bilinear maps. In: PKC 2004, LNCS, vol. 2947, pp. 130–144 (2004)
10.
go back to reference Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344–359 (2008) Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: PKC 2008, LNCS, vol. 4939, pp. 344–359 (2008)
11.
go back to reference Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefMATH Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefMATH
12.
go back to reference Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2506573 Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.​1109/​TPDS.​2015.​2506573
13.
go back to reference Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword Rranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)CrossRef
14.
go back to reference Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537–554 (1999) Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO 1999, LNCS, vol. 1666, pp. 537–554 (1999)
15.
go back to reference Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1–17 (2013) Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices and applications. In: EUROCRYPT 2013, LNCS, vol. 7881, pp. 1–17 (2013)
16.
go back to reference Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308–322 (2007) Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless signature revisited. In: ACISP 2007, LNCS, vol. 4586, pp. 308–322 (2007)
17.
go back to reference Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180–189 (2005) Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. ACM CCS 2005, 180–189 (2005)
18.
go back to reference Langlois, A., Stehlé, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239–256 (2014) Langlois, A., Stehlé, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: EUROCRYPT 2014, LNCS, vol. 8441, pp 239–256 (2014)
19.
go back to reference Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)MathSciNetCrossRefMATH Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)MathSciNetCrossRefMATH
20.
go back to reference Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317–323 (2015) Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Tech. 16(2), 317–323 (2015)
21.
go back to reference Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto’84, LNCS, vol. 196, pp. 47–53 (1984) Shamir, A.: Identity based cryptosystems and signature schemes. In: Crypto’84, LNCS, vol. 196, pp. 47–53 (1984)
22.
go back to reference Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012) Wei, G., Yang, X., Shao, J.: Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Trans. Internet Inf. Syst. 6(12), 3352–3365 (2012)
23.
go back to reference Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153–170 (2009) Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 153–170 (2009)
24.
go back to reference Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143–160 (2011) Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrs, O.: Bridging broadcast encryption and group key agreement. In: ASIACRYPT 2011, LNCS, vol. 7073, pp. 143–160 (2011)
25.
go back to reference Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE/ACM Trans. Netw. 21(2), 621–633 (2013)CrossRef Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: a new key management paradigm. IEEE/ACM Trans. Netw. 21(2), 621–633 (2013)CrossRef
26.
go back to reference Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)CrossRef
27.
go back to reference Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)CrossRef Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459–470 (2014)CrossRef
28.
go back to reference Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510–519 (2010) Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: COCOON 2010, LNCS, vol. 6196, pp. 510–519 (2010)
29.
go back to reference Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)CrossRef Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Netw. 55(15), 3246–3255 (2011)CrossRef
30.
go back to reference Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182–195 (2015) Zhang, L.: Certificateless one-pass and two-party authenticated key agreement protocol and its extensions. Inf. Sci. 293, 182–195 (2015)
31.
go back to reference Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239–254 (2014) Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Chow, S.S.M., Shi, W.: Secure one-to-group communications: escrow-free ID-based asymmetric group key agreement. In: INSCRYPT 2014, LNCS, vol. 8567, pp. 239–254 (2014)
32.
go back to reference Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496–510 (2014) Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably secure certificateless authenticated asymmetric group key agreement. In: ISPEC 2014, LNCS, vol. 8434, pp. 496–510 (2014)
33.
go back to reference Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi:10.1109/TC.2015.2485225 MATH Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. (2015). doi:10.​1109/​TC.​2015.​2485225 MATH
34.
go back to reference Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRef Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRef
35.
go back to reference Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi:10.1109/TITS.2016.2579162 Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. (2016). doi:10.​1109/​TITS.​2016.​2579162
Metadata
Title
Certificateless and identity-based authenticated asymmetric group key agreement
Authors
Lei Zhang
Qianhong Wu
Bo Qin
Hua Deng
Jiangtao Li
Jianwei Liu
Wenchang Shi
Publication date
29-06-2016
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 5/2017
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-016-0339-8

Other articles of this Issue 5/2017

International Journal of Information Security 5/2017 Go to the issue

Premium Partner