An authenticated asymmetric group key agreement based on attribute encryption

Qikun Zhang, Yong Gan, Lu Liu, Xianmin Wang, Xiangyang Luo, Yuanzhang Li*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

49 Citations (Scopus)

Abstract

Secure communication among terminals in a group is necessary in Internet of Things (IoT). Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to give alert for weather conditions, road defects, traffic conditions, etc. However, people are also worried about two major security issues: privacy and authentication. Under an open and untrusted network, common secret keys which are negotiated by group terminals through group key agreement are used to realize encryption communication among group members. Personal identity information is exposed and privacy cannot be protected under the traditional identity-based authenticated asymmetric group key agreement protocol. Therefore, an authenticated asymmetric group key agreement based on attribute encryption (ABE-AAGKA) is proposed, which combines the advantages of attribute encryption and identity authentication. Attribute encryption and authentication techniques are adopted to guarantee the secure of group key agreement, and protect the personal privacy. Moreover, calculate and communicate loads are able to be moved to powerful server through the protocol to reduce the workload on intelligent terminal under the imbalanced mobile networks. The proposed protocol is proven to be secure under the inverse computational Diffie-Hellman (ICDH) problem assumption. Performance analysis shows that the proposed scheme is more efficient than existing works.

Original languageEnglish
Pages (from-to)1-10
Number of pages10
JournalJournal of Network and Computer Applications
Volume123
DOIs
Publication statusPublished - 1 Dec 2018

Keywords

  • Asymmetric group key agreement
  • Attribute-based authentication
  • Personal privacy protection
  • Secure communication

Fingerprint

Dive into the research topics of 'An authenticated asymmetric group key agreement based on attribute encryption'. Together they form a unique fingerprint.

Cite this