Identity-based authenticated asymmetric group key agreement protocol

  • Authors:
  • Lei Zhang;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer

  • Affiliations:
  • Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO, Tarragona, Catalonia;Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO, Tarragona, Catalonia and Wuhan University, School of Computer, Key Lab. of Aerospace Information Security and Trusted Computing ...;Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO, Tarragona, Catalonia and Xi'an University of Technology, School of Science, Dept. of Maths, China;Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO, Tarragona, Catalonia

  • Venue:
  • COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we first propose a security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA) protocols. We then propose an IB-AAGKA protocol which is proven secure under the Bilinear Diffie-Hellman Exponent assumption.