An ID-based authenticated dynamic group key agreement with optimal round

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:vay_b
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Group key agreement protocols are crucial for achieving secure group communications.They are designed to provide a set of users with a shared secret key to achieve cryptographic goal over a public network.When group membership changes,the session key should be refreshed efficiently and securely.Most previous group key agreement protocols need at least two rounds to establish or refresh session keys.In this paper,a dynamic authenticated group key agreement(DAGKA) protocol based on identity-based cryptography is presented.By making use of the members’ values stored in previous sessions,our Join and Leave algorithms reduce the computation and communication costs of members.In the proposed protocol,Setup and Join algorithms need one round.The session key can be refreshed without message exchange among remaining users in Leave algorithm,which makes the protocol more practical.Its security is proved under decisional bilinear Diffie-Hellman(DBDH) assumption in random oracle model. Group key agreement protocols are crucial for achieving secure group communications. They are designed to provide a set of users with a shared secret key to achieve cryptographic goal over a public network. Organization group membership changes, the session key should be refreshed efficiently and securely. Most previous group key agreement protocols need at least two rounds to establish or refresh session keys. In this paper, a dynamic authenticated group key agreement (DAGKA) protocol based on identity-based cryptography is presented. By making use of the members’ values ​​stored in previous sessions, our Join and Leave algorithms reduce the computation and communication costs of members. The proposed protocol, Setup and Join algorithms need one round. The session key can be refreshed without message exchange among remaining users in Leave algorithm, which makes the protocol more practical.Its security isarently under decisional bilinear Diffie-Hellman (DBDH) assumption in random oracle model.
其他文献
随着现代科技的发展,电力系统面临着越来越严重的窃电风险,不法分子尝试采用全新的窃电技术控制电力系统,威胁供电系统安全,影响供电企业的经济效益。对此必须加大用电监察工作力
视力下降,头晕目眩,这是案头工作的人最大的痛苦,吃黑豆就能缓解这些不适。因为黑豆中富含抗氧化成分——花色素和对眼睛有益的维生素A。其中陈醋能促进黑豆中的 Vision los
随着社会的快速发展,BIM技术在信息化时代下对建筑业起到非常重要的影响,在部分领域内BIM技术都有所涉及。现阶段,在旧建筑改造中的应用必须满足绿色建设发展的要求。虽然BIM技
随着我国市场经济的深入发展,各行各业的竞争变得越来越激烈。那么为了提高自己的竞争能力,就需要提升产品的质量。故此,在土木工程施工中,就需要重视对质量的监督与管理,以建设出
计算机网络利用通信线路和通信设备将多个计算机系统中的不同地域的可以独立管理的计算机系统互联起来,来达到资源共享的目的,网络操作系统对其发挥作用,来共享和管理计算机网络