A constant rounds group key agreement protocol without using hash functions

被引:2
|
作者
Zhang, Hua [1 ]
Wen, Qiao-yan [1 ]
Zhang, Jie [1 ]
Li, Wen-min [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
EXCHANGE; SECURE;
D O I
10.1002/nem.720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to encrypt and authenticate messages Sent over networks to achieve security. Network users must therefore agree Upon encryption keys and authentication keys The authenticated Diffie-Hellman key agreement protocol is used to provide authentication in communication systems. In this paper we present a group key agreement protocol without using one-way hash functions that are based on the DDH problem. The protocol achieves efficiency in both communication and computation aspects We analyzed the security in the security model formalized by Bresson et al Copyright (C) 2009 John Wiley & Sons, Ltd
引用
收藏
页码:457 / 464
页数:8
相关论文
共 50 条
  • [31] A simple group Diffle-Hellman key agreement protocol without member serialization
    Zou, XK
    Ramamurthy, B
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 725 - 731
  • [32] Improved pairing-free constant round certificateless authenticated group key agreement protocol
    Shan C.
    Hu K.
    Xue J.
    Hu C.
    Zhao X.
    Xue, Jingfeng (xuejf@bit.edu.cn), 1600, Tsinghua University (57): : 580 - 585
  • [33] A New Mobile Payment Protocol (GMPCP) By Using A New Group Key Agreement Protocol (VTGKA)
    Vahidalizadehdizaj, Mohammad
    Tao, Lixin
    Jadav, Jigar
    2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 456 - 462
  • [34] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [35] Multi-group key agreement protocol using secret sharing scheme
    Subrahmanyam R.
    Rekha N.R.
    Rao Y.V.S.
    International Journal of Security and Networks, 2023, 18 (03) : 143 - 152
  • [36] A hierarchical group key agreement protocol using orientable attributes for cloud computing
    Zhang, Qikun
    Wang, Xianmin
    Yuan, Junling
    Liu, Lu
    Wang, Ruifang
    Huang, Hong
    Li, Yuanzhang
    INFORMATION SCIENCES, 2019, 480 : 55 - 69
  • [37] An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array
    Jiang, Yi
    Huang, Qingsong
    Zhu, Cheng
    Wang, Yiqiu
    Shen, Jian
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 36 - 40
  • [38] Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
    Wang, Linjie
    Tian, Youliang
    Zhang, Duo
    Lu, Yanhua
    INFORMATION SCIENCES, 2019, 503 : 61 - 71
  • [39] Password-based group key exchange in a constant number of rounds
    Abdalla, Michel
    Bresson, Emmanuel
    Chevassut, Olivier
    Pointcheval, David
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 427 - 442
  • [40] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,