A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants

Tsu Yang Wu, Tung Tso Tsai, Yuh Min Tseng

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

Original languageEnglish
Article number367264
JournalScientific World Journal
Volume2014
DOIs
Publication statusPublished - 2014

Fingerprint

Confidentiality
Electric fuses
protocol
public

All Science Journal Classification (ASJC) codes

  • Biochemistry, Genetics and Molecular Biology(all)
  • Environmental Science(all)

Cite this

@article{96c8479ad5b54fa6a3d56c2f1a254ebe,
title = "A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants",
abstract = "The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.",
author = "Wu, {Tsu Yang} and Tsai, {Tung Tso} and Tseng, {Yuh Min}",
year = "2014",
doi = "10.1155/2014/367264",
language = "English",
volume = "2014",
journal = "The Scientific World Journal",
issn = "2356-6140",
publisher = "Hindawi Publishing Corporation",

}

A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants. / Wu, Tsu Yang; Tsai, Tung Tso; Tseng, Yuh Min.

In: Scientific World Journal, Vol. 2014, 367264, 2014.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants

AU - Wu, Tsu Yang

AU - Tsai, Tung Tso

AU - Tseng, Yuh Min

PY - 2014

Y1 - 2014

N2 - The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

AB - The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.

UR - http://www.scopus.com/inward/record.url?scp=84903648284&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84903648284&partnerID=8YFLogxK

U2 - 10.1155/2014/367264

DO - 10.1155/2014/367264

M3 - Article

C2 - 24991641

AN - SCOPUS:84903648284

VL - 2014

JO - The Scientific World Journal

JF - The Scientific World Journal

SN - 2356-6140

M1 - 367264

ER -