Anonymous ID-based Group Key Agreement Protocol without Pairing
نویسندگان
چکیده
Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group-oriented applications such as teleconferences, collaborative workspace, pay per-view etc. A number of group key agreement protocols have been proposed for these objectives. However most of the protocols have not considers the anonymity of the participants. Although in some applications the privacy of member’s identity becomes more crucial and urgent especially for mobile users of a wireless network due to the open nature of radio media. The protocols having complex computations like large modular exponentiations, pairing computations, etc. are not well suited in wireless environments. Hence this paper proposes an anonymous ID-based group key agreement protocol without bilinear pairings. The proposed protocol also have anonymous join and leave procedures to facilitates the dynamic group operations. Security and performance analysis of proposed protocol shows that it provides strong security protection under different security attributes, and needs comparatively less computation and communication overheads than the other existing protocols. In addition the formal security verification of proposed protocol has been done by using AVISPA tool which shows that it is unforgeable against active and passive attacks.
منابع مشابه
Anonymous ID-based Group Key Agreement for Wireless Networks
Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID-based cryptosystem have been proposed for this objective. Though bearing beneficial features like reduced management cost, private key delegation from ID-based cryptosystem, they have not taken into account privacy issu...
متن کاملAnonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System
Mostly, current security architectures for Digital rights management (DRM) systems use either Public Key Cryptography (PKC) or Identity-based Public Key Cryptography (ID-PKC). However, PKC has a complex certificate management and ID-PKC has a key escrow problem. Certificateless Public Key Cryptography (CL-PKC) has some attractive properties which seem compatible with the requirements of DRM sys...
متن کاملA New Efficient Authenticated ID-Based Group Key Agreement Protocol
Group key agreement (GKA) protocols Play a main role in constructing secure multicast channels. These protocols are algorithms that describe how a group of parties communicating over a public network can gain a common secret key. ID-based authenticated group key agreement (AGKA) cryptosystems based on bilinear pairings are update researching subject because of the simplicity of their public key...
متن کاملID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
With various applications of Weil pairing (Tate pairing) to cryptography, ID-based encryption schemes, digital signature schemes, blind signature scheme, two-party authenticated key agreement schemes, and tripartite key agreement scheme were proposed recently, all of them using bilinear pairing (Weil or Tate pairing). In this paper, we propose an ID-based one round authenticated tripartite key ...
متن کاملAn Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
We describe an ID based authenticated two pass key agreement protocol which makes use of the Weil pairing The protocol is described and its properties are discussed including the ability to add key con rmation
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016