Identity-based authenticated asymmetric group key agreement protocol

  • Lei Zhang*
  • , Qianhong Wu
  • , Bo Qin
  • , Josep Domingo-Ferrer
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

59 Scopus citations

Abstract

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we first propose a security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA) protocols. We then propose an IB-AAGKA protocol which is proven secure under the Bilinear Diffie-Hellman Exponent assumption.

Original languageEnglish
Title of host publicationComputing and Combinatorics - 16th Annual International Conference, COCOON 2010, Proceedings
Pages510-519
Number of pages10
DOIs
StatePublished - 2010
Externally publishedYes
Event16th Annual International Computing and Combinatorics Conference, COCOON 2010 - Nha Trang, Viet Nam
Duration: 19 Jul 201021 Jul 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6196 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th Annual International Computing and Combinatorics Conference, COCOON 2010
Country/TerritoryViet Nam
CityNha Trang
Period19/07/1021/07/10

Keywords

  • Asymmetric Group Key Agreement
  • Bilinear Map
  • Group Key Agreement
  • Identity-Based Public-Key Cryptography

Fingerprint

Dive into the research topics of 'Identity-based authenticated asymmetric group key agreement protocol'. Together they form a unique fingerprint.

Cite this