TY - JOUR
T1 - An authenticated asymmetric group key agreement for imbalanced mobile networks
AU - Zhang, Qikun
AU - Zhang, Quanxin
AU - Ma, Zhongmei
AU - Tan, Yu'An
PY - 2014/10/1
Y1 - 2014/10/1
N2 - A Group key agreement (GKA) protocol enables a group of communicating parties to negotiate a common secret key over an open, untrusted network. The design goal of GKA is to achieve secure group communication, which is an important research issue for mobile communication. The conventional (symmetric) GKA protocol allows a group of members to establish a common secret key for imbalanced mobile networks. However, only the group members can broadcast secret message to the group. To overcome this limitation, this paper proposes an authenticated asymmetric GKA protocol. Instead of a common secret key, each group member negotiates a common group public key and holds a different decryption key. The paper proposed protocol supports the dynamic nodes update of mobile networks, which has forward secrecy and backward secrecy of group key. This protocol is proven secure under the Bilinear Computational Diffie- Hellman problem assumption and the performance analysis shows that the proposed scheme is highly efficient.
AB - A Group key agreement (GKA) protocol enables a group of communicating parties to negotiate a common secret key over an open, untrusted network. The design goal of GKA is to achieve secure group communication, which is an important research issue for mobile communication. The conventional (symmetric) GKA protocol allows a group of members to establish a common secret key for imbalanced mobile networks. However, only the group members can broadcast secret message to the group. To overcome this limitation, this paper proposes an authenticated asymmetric GKA protocol. Instead of a common secret key, each group member negotiates a common group public key and holds a different decryption key. The paper proposed protocol supports the dynamic nodes update of mobile networks, which has forward secrecy and backward secrecy of group key. This protocol is proven secure under the Bilinear Computational Diffie- Hellman problem assumption and the performance analysis shows that the proposed scheme is highly efficient.
KW - Asymmetric group key agreement
KW - Bilinear pairings
KW - Computational Diffie-Hellman problem
KW - Dynamic group key update
UR - http://www.scopus.com/inward/record.url?scp=84907567633&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:84907567633
SN - 1022-4653
VL - 23
SP - 827
EP - 835
JO - Chinese Journal of Electronics
JF - Chinese Journal of Electronics
IS - 4
ER -