An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement
نویسندگان
چکیده
Cross-domain authenticated asymmetric group key agreement allows members in different domains to establish a secure communication channel and the senders can be anyone. However, existing schemes do not meet requirement of batch verification negotiation phase, which makes have low efficiency. To address this problem, an identity-based cross-domain is proposed that supports verification. The performance analysis shows protocol highly efficient. Finally, proved under k-Bilinear Diffie–Hellman Exponent assumption.
منابع مشابه
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
Lei et al. [26] proposed a new asymmetric group key agreement protocol allowing a set of users to negotiate a common encryption key accessible by any user, and each user holds her respective decryption key. This enables the confidential message communication among group users, and grants any outsider to send message to the group. In this paper, an authenticated asymmetric group key agreement pr...
متن کاملIdentity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the...
متن کاملIdentity Based Authenticated Group Key Agreement Protocol
An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...
متن کاملProvably secure one-round identity-based authenticated asymmetric group key agreement protocol
The newly introduced notion of asymmetric group key agreement (AGKA) enables external users to securely send messages to group members. The existing AGKA is only secure against passive attacks which are too weak to capture the attacks in the real world. In this paper, we formalize an active security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA). We then presen...
متن کاملIdentity Based Authenticated Key Agreement from Pairings
We present a new identity based authenticated key agreement protocol from pairings satisfying the required security attributes. The security of our protocol is based on the bilinear Diffie-Hellman assumption.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2021
ISSN: ['2078-2489']
DOI: https://doi.org/10.3390/info12030112