Asymmetric Group Key Agreement Protocol from Short Signatures

  • Kunyu Shen
  • , Lei Zhang*
  • , Rui Zhang
  • , Qihao Fang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel notion ensures the confidentiality of communication among group members and allows any external entity to send messages to the group. However, the existing authenticated asymmetric group key agreement protocols are designed in identity-based cryptosystem or certificateless public key cryptosystem, which are not widely deployed. In this paper, we propose an efficient authenticated asymmetric group key agreement protocol. The protocol captures the security of secrecy, known-key security, key-compromise impersonation, unknown key-share and key control while being resistant to active attacks. The security of our protocol is reduced to the k-BDHE problem.

Original languageEnglish
Title of host publication2022 IEEE 8th International Conference on Computer and Communications, ICCC 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1229-1233
Number of pages5
ISBN (Electronic)9781665450515
DOIs
StatePublished - 2022
Event8th IEEE International Conference on Computer and Communications, ICCC 2022 - Virtual, Online, China
Duration: 9 Dec 202212 Dec 2022

Publication series

Name2022 IEEE 8th International Conference on Computer and Communications, ICCC 2022

Conference

Conference8th IEEE International Conference on Computer and Communications, ICCC 2022
Country/TerritoryChina
CityVirtual, Online
Period9/12/2212/12/22

Keywords

  • Asymmetric Group Key Agreement
  • Bilinear Map
  • k-BDHE problem

Fingerprint

Dive into the research topics of 'Asymmetric Group Key Agreement Protocol from Short Signatures'. Together they form a unique fingerprint.

Cite this