13 January 2012 Identity-based group key exchange protocols resistant to colluding attacks
Author Affiliations +
Abstract
An ID-based authenticated group key agreement (AGKA) protocol allows a group of members to share a key and provide an assurance of key sharing with an intended group with the user's identity, which is used for conferencing environments. In 2004, Choi et al proposed an ID-based authenticated group key agreement with bilinear maps (also called CHL protocols), which was extended from Burmester and Desmedt conference key agreement protocols. Unfortunately, their protocols were found to be vulnerable to the insider attacks in which cases that the two malicious users have the previous authentication transcripts of the party by Zhang, Chen and Shim. In this paper, we proposed an improved ID-based AGKA. In our scheme, each session has a unique session identity which is published by Key Generation Center. With such unique session identity binding to each session, our protocols can prevent the insider attack. Especially, our protocols can not enhance the computationally cost and it is still efficient.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yunjie Jiang, Yunjie Jiang, } "Identity-based group key exchange protocols resistant to colluding attacks", Proc. SPIE 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis, 83491F (13 January 2012); doi: 10.1117/12.920354; https://doi.org/10.1117/12.920354
PROCEEDINGS
5 PAGES


SHARE
RELATED CONTENT

Adaptive graph construction for Isomap manifold learning
Proceedings of SPIE (March 15 2015)
Model recommendation for pedestrian detection
Proceedings of SPIE (August 28 2016)
Constructing near-tight wavelet frames by neural networks
Proceedings of SPIE (October 22 1996)
Hybrid fuzzy regression with trapezoidal fuzzy data
Proceedings of SPIE (January 13 2012)
Intelligent curve tracking algorithms and implementations
Proceedings of SPIE (September 17 1998)

Back to Top