A constant rounds group key agreement protocol without using hash functions

被引:2
|
作者
Zhang, Hua [1 ]
Wen, Qiao-yan [1 ]
Zhang, Jie [1 ]
Li, Wen-min [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
EXCHANGE; SECURE;
D O I
10.1002/nem.720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to encrypt and authenticate messages Sent over networks to achieve security. Network users must therefore agree Upon encryption keys and authentication keys The authenticated Diffie-Hellman key agreement protocol is used to provide authentication in communication systems. In this paper we present a group key agreement protocol without using one-way hash functions that are based on the DDH problem. The protocol achieves efficiency in both communication and computation aspects We analyzed the security in the security model formalized by Bresson et al Copyright (C) 2009 John Wiley & Sons, Ltd
引用
收藏
页码:457 / 464
页数:8
相关论文
共 50 条
  • [1] An Enhanced Password-based Group Key Agreement Protocol with Constant Rounds
    Yuan, Wei
    Hu, Liang
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2589 - 2594
  • [2] A Survey of Group Key Agreement Protocols with Constant Rounds
    Xiong, Hu
    Wu, Yan
    Lu, Zhenyu
    ACM COMPUTING SURVEYS, 2019, 52 (03)
  • [3] Robust generalized MQV key agreement protocol without using one-way hash functions
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2002, 24 (03) : 241 - 246
  • [4] Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 467 - 470
  • [5] A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds
    Teng, Jikai
    Wu, Chuankun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (01) : 104 - 110
  • [6] Security of robust generalized MQV key agreement protocol without using one-way hash functions
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 431 - 436
  • [7] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [8] Secure group key agreement protocol based on chaotic Hash
    Guo, Xianfeng
    Zhang, Jiashu
    INFORMATION SCIENCES, 2010, 180 (20) : 4069 - 4074
  • [9] Security weakness in an authenticated group key agreement protocol in two rounds
    Hwang, Jung Yeon
    Choi, Kyu Young
    Lee, Dong Hoon
    COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3719 - 3724
  • [10] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170