Towards ID-based authenticated group key exchange protocol with identifying malicious participants

Tsu Yang Wu, Yuh Min Tseng

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn't realize the security issue of withstanding insider attacks. Withstanding insider attacks mean that it can detect whether malicious participants exist in the group key exchange protocol. Nevertheless, an AGKE protocol resistant to insider attacks is still unable to find "who are malicious participants". In this paper, we propose an ID-based AGKE protocol with identifying malicious participants. In our protocol, we use a confirmed computation property to achieve identifying malicious participants. Certainly, it is also secure against insider attacks. In the random oracle model and under related mathematical hard problems, we prove that the proposed protocol a secure AGKE protocol with identifying malicious participants.

Original languageEnglish
Pages (from-to)315-334
Number of pages20
JournalInformatica (Netherlands)
Volume23
Issue number2
Publication statusPublished - 2012

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Applied Mathematics

Cite this