13 January 2012 Identity-based group key exchange protocols resistant to colluding attacks
Author Affiliations +
Abstract
An ID-based authenticated group key agreement (AGKA) protocol allows a group of members to share a key and provide an assurance of key sharing with an intended group with the user's identity, which is used for conferencing environments. In 2004, Choi et al proposed an ID-based authenticated group key agreement with bilinear maps (also called CHL protocols), which was extended from Burmester and Desmedt conference key agreement protocols. Unfortunately, their protocols were found to be vulnerable to the insider attacks in which cases that the two malicious users have the previous authentication transcripts of the party by Zhang, Chen and Shim. In this paper, we proposed an improved ID-based AGKA. In our scheme, each session has a unique session identity which is published by Key Generation Center. With such unique session identity binding to each session, our protocols can prevent the insider attack. Especially, our protocols can not enhance the computationally cost and it is still efficient.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yunjie Jiang, "Identity-based group key exchange protocols resistant to colluding attacks", Proc. SPIE 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis, 83491F (13 January 2012); doi: 10.1117/12.920354; https://doi.org/10.1117/12.920354
PROCEEDINGS
5 PAGES


SHARE
Back to Top