Certificateless and identity-based authenticated asymmetric group key agreement

  • Lei Zhang*
  • , Qianhong Wu
  • , Bo Qin
  • , Hua Deng
  • , Jiangtao Li
  • , Jianwei Liu
  • , Wenchang Shi
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

Group key agreement (GKA) is one of the traditional ways to guarantee the subsequent secure group communications. However, conventional GKA protocols face two limitations, i.e., they require two or more rounds to establish secure channels and are sender restricted. Asymmetric group key agreement (AGKA) eliminates above two limitations of GKA. It allows a group of users to establish a public group encryption key and a different secret decryption key of each group member in one round. Any user who knows the group encryption key can encrypt to the group members. This paper studies authenticated AGKA in certificateless and identity-based public key cryptosystems. We formalize the security model of certificateless authenticated asymmetric group key agreement and realize a one-round certificateless authenticated asymmetric group key agreement protocol to resist active attacks in the real world. We also investigate the relation between certificateless authenticated AGKA and identity-based authenticated AGKA. We propose a concrete conversion from certificateless authenticated AGKA to session key escrow-free identity-based authenticated AGKA.

Original languageEnglish
Pages (from-to)559-576
Number of pages18
JournalInternational Journal of Information Security
Volume16
Issue number5
DOIs
StatePublished - 1 Oct 2017

Keywords

  • Asymmetric group key agreement
  • Certificateless public key cryptosystem
  • Group key agreement
  • Identity-based public key cryptosystem

Fingerprint

Dive into the research topics of 'Certificateless and identity-based authenticated asymmetric group key agreement'. Together they form a unique fingerprint.

Cite this