A constant rounds group key agreement protocol without using hash functions

被引:2
|
作者
Zhang, Hua [1 ]
Wen, Qiao-yan [1 ]
Zhang, Jie [1 ]
Li, Wen-min [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
EXCHANGE; SECURE;
D O I
10.1002/nem.720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to encrypt and authenticate messages Sent over networks to achieve security. Network users must therefore agree Upon encryption keys and authentication keys The authenticated Diffie-Hellman key agreement protocol is used to provide authentication in communication systems. In this paper we present a group key agreement protocol without using one-way hash functions that are based on the DDH problem. The protocol achieves efficiency in both communication and computation aspects We analyzed the security in the security model formalized by Bresson et al Copyright (C) 2009 John Wiley & Sons, Ltd
引用
收藏
页码:457 / 464
页数:8
相关论文
共 50 条
  • [21] Key Exposure Resistant Group Key Agreement Protocol
    Zhou, Tianqi
    Shen, Jian
    Ji, Sai
    Ren, Yongjun
    Zhang, Mingwu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 83 - 97
  • [22] Constant round dynamic group key agreement
    Dutta, R
    Barua, R
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 74 - 88
  • [23] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +
  • [24] A group key agreement protocol from pairings
    Duursma, I
    Lee, HS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1451 - 1456
  • [25] A key agreement protocol based on group actions
    Cagman, Abdullah
    Polat, Kadirhan
    Tas, Sait
    NUMERICAL METHODS FOR PARTIAL DIFFERENTIAL EQUATIONS, 2021, 37 (02) : 1112 - 1119
  • [26] A secure key agreement protocol for dynamic group
    Muhammad Bilal
    Shin-Gak Kang
    Cluster Computing, 2017, 20 : 2779 - 2792
  • [27] A secure key agreement protocol for dynamic group
    Bilal, Muhammad
    Kang, Shin-Gak
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2779 - 2792
  • [28] Analysis of an efficient group key agreement protocol
    Lee, Su Mi
    Lee, Dong Hoon
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 638 - 639
  • [29] An efficient dynamic group key agreement protocol
    College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
    Zhejiang Daxue Xuebao (Gongxue Ban), 2007, 2 (236-238+244):
  • [30] CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
    Cui, Yang
    Hanaoka, Goichiro
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 967 - 970