Provably secure constant round contributory group key agreement in dynamic setting

被引:83
作者
Dutta, Ratna [1 ]
Barua, Rana [2 ]
机构
[1] Natl Univ Ireland, Dept Comp Sci, Claude Shannon Inst, Maynooth, Kildare, Ireland
[2] Indian Stat Inst, Stat Math Unit, Kolkata 700108, W Bengal, India
关键词
decision Diffie-Hellman (DDH) problem; dynamic membership change; group key agreement; provable security;
D O I
10.1109/TIT.2008.920224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the group at any time during protocol execution with updated keys. In contrast to BD protocol, let us refer to our protocol as DB protocol. Although the DB protocol is similar to BD protocol, there are subtle differences between them: 1) Key computation in DB protocol is different and simpler than in BD protocol with same complexity of BD protocol; 2) Number of rounds required in our authenticated DB protocol is one less than that in authenticated BD protocol introduced by Katz-Yung; 3) DB protocol is more flexible than BD protocol in the sense that DB protocol is dynamic. The reusability of user's precomputed data in previous session enables the join and leave algorithms of our DB protocol to reduce most user's computation complexities which can be useful in real life applications; and 4) DB protocol has the ability to detect the presence of corrupted group members, although one can not detect who among the group members are behaving improperly.
引用
收藏
页码:2007 / 2025
页数:19
相关论文
共 49 条
[1]  
[Anonymous], 1998, P 30 ANN ACM S THEOR
[2]  
[Anonymous], P 5 ACM C COMP COMM
[3]  
Barua R, 2003, LECT NOTES COMPUT SC, V2904, P205
[4]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[5]  
BELLARE M, 1993, LNCS, V773, P231
[6]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[7]  
Boyd C, 2003, LECT NOTES COMPUT SC, V2567, P161
[8]  
Bresson E, 2004, LECT NOTES COMPUT SC, V2947, P115
[9]  
Bresson E, 2002, LECT NOTES COMPUT SC, V2332, P321
[10]   Mutual authentication and group key agreement for low-power mobile devices [J].
Bresson, E ;
Chevassut, O ;
Essiari, A ;
Pointcheval, D .
COMPUTER COMMUNICATIONS, 2004, 27 (17) :1730-1737