Two Level Authenticated Group Key Agreement Protocol with Privacy-Preservation for Resource-Limited Mobile Devices

被引:0
|
作者
Chang, Liang-Peng [1 ]
Wu, Tzong-Chen [1 ]
Hsu, Chien-Lung
Lu, Chung-Fu [1 ,2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[2] Taipei Coll Maritime Technol, Dept Comp & Commun Engn, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2010年 / 11卷 / 04期
关键词
Privacy; Group key agreement; Mobile; ECC; Self-certified; ANONYMITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a two level ECC-based group key agreement scheme with privacy-preservation, where a group manager can easily setup a secure protocol in a public network to let the intended group members share an authenticated session key without disclosing their identities in the subsequent communication. To protect privacy, the proposed scheme provides the property of user anonymity, an adversary can not intercept the information of intended group member's identity and use it to launch some attacks. By using self-certified public keys and based on the elliptic curve cryptosystems (ECC), the proposed scheme not only satisfies the security requirements of perfect forward secrecy, known key security (resistance to known key attacks), implicit key authentication, and key confirmation (explicit key authentication), but also achieves performance efficiency in practices. The proposed protocol can gain much efficiency in saving both the communicational cost and the computational effort as compared to previous works implemented by modular exponentiation, so it is quite suitable to be used for resource-limited mobile devices in mobile internet.
引用
收藏
页码:519 / 528
页数:10
相关论文
共 39 条
  • [21] Group key agreement protocol among mobile devices in different cells
    Kim, Jeeyeon
    Kim, Seungjoo
    Chun, Kilsoo
    Lee, Jaeil
    Won, Dongho
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 1090 - +
  • [22] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [23] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Hsu, Chingfang
    Harn, Lein
    Xia, Zhe
    Zhao, Zhuo
    Xu, Hang
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2403 - 2417
  • [24] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Chingfang Hsu
    Lein Harn
    Zhe Xia
    Zhuo Zhao
    Hang Xu
    Wireless Personal Communications, 2023, 129 : 2403 - 2417
  • [25] A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
    Cheng, Dongxu
    Liu, Jianwei
    Guan, Zhenyu
    Shang, Tao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (11): : 2716 - 2722
  • [26] Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices
    Rewal, Purva
    Singh, Mrityunjay
    Mishra, Dheerendra
    Pursharthi, Komal
    Mishra, Ankita
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [27] A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    SK Hafizul Islam
    G. P. Biswas
    annals of telecommunications - annales des télécommunications, 2012, 67 : 547 - 558
  • [28] A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    Islam, S. K. Hafizul
    Biswas, G. P.
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (11-12) : 547 - 558
  • [29] A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure
    VANKAMAMIDI S NARESH
    NISTALA V E S MURTHY
    Sadhana, 2015, 40 : 2143 - 2161
  • [30] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784