Towards ID-based authenticated group key exchange protocol with identifying malicious participants

Tsu Yang Wu, Yuh Min Tseng

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn't realize the security issue of withstanding insider attacks. Withstanding insider attacks mean that it can detect whether malicious participants exist in the group key exchange protocol. Nevertheless, an AGKE protocol resistant to insider attacks is still unable to find "who are malicious participants". In this paper, we propose an ID-based AGKE protocol with identifying malicious participants. In our protocol, we use a confirmed computation property to achieve identifying malicious participants. Certainly, it is also secure against insider attacks. In the random oracle model and under related mathematical hard problems, we prove that the proposed protocol a secure AGKE protocol with identifying malicious participants.

Original languageEnglish
Pages (from-to)315-334
Number of pages20
JournalInformatica (Netherlands)
Volume23
Issue number2
Publication statusPublished - 2012

Fingerprint

Key Exchange
Identity-based
Communication
Attack
Bilinear Pairings
Group Communication
Secure Communication
Random Oracle Model
Distributed Applications

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Applied Mathematics

Cite this

@article{a3839c935c314ec5bdd906897fac71fe,
title = "Towards ID-based authenticated group key exchange protocol with identifying malicious participants",
abstract = "An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn't realize the security issue of withstanding insider attacks. Withstanding insider attacks mean that it can detect whether malicious participants exist in the group key exchange protocol. Nevertheless, an AGKE protocol resistant to insider attacks is still unable to find {"}who are malicious participants{"}. In this paper, we propose an ID-based AGKE protocol with identifying malicious participants. In our protocol, we use a confirmed computation property to achieve identifying malicious participants. Certainly, it is also secure against insider attacks. In the random oracle model and under related mathematical hard problems, we prove that the proposed protocol a secure AGKE protocol with identifying malicious participants.",
author = "Wu, {Tsu Yang} and Tseng, {Yuh Min}",
year = "2012",
language = "English",
volume = "23",
pages = "315--334",
journal = "Informatica",
issn = "0868-4952",
publisher = "IOS Press",
number = "2",

}

Towards ID-based authenticated group key exchange protocol with identifying malicious participants. / Wu, Tsu Yang; Tseng, Yuh Min.

In: Informatica (Netherlands), Vol. 23, No. 2, 2012, p. 315-334.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Towards ID-based authenticated group key exchange protocol with identifying malicious participants

AU - Wu, Tsu Yang

AU - Tseng, Yuh Min

PY - 2012

Y1 - 2012

N2 - An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn't realize the security issue of withstanding insider attacks. Withstanding insider attacks mean that it can detect whether malicious participants exist in the group key exchange protocol. Nevertheless, an AGKE protocol resistant to insider attacks is still unable to find "who are malicious participants". In this paper, we propose an ID-based AGKE protocol with identifying malicious participants. In our protocol, we use a confirmed computation property to achieve identifying malicious participants. Certainly, it is also secure against insider attacks. In the random oracle model and under related mathematical hard problems, we prove that the proposed protocol a secure AGKE protocol with identifying malicious participants.

AB - An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn't realize the security issue of withstanding insider attacks. Withstanding insider attacks mean that it can detect whether malicious participants exist in the group key exchange protocol. Nevertheless, an AGKE protocol resistant to insider attacks is still unable to find "who are malicious participants". In this paper, we propose an ID-based AGKE protocol with identifying malicious participants. In our protocol, we use a confirmed computation property to achieve identifying malicious participants. Certainly, it is also secure against insider attacks. In the random oracle model and under related mathematical hard problems, we prove that the proposed protocol a secure AGKE protocol with identifying malicious participants.

UR - http://www.scopus.com/inward/record.url?scp=84863643575&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84863643575&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84863643575

VL - 23

SP - 315

EP - 334

JO - Informatica

JF - Informatica

SN - 0868-4952

IS - 2

ER -