2010
DOI: 10.1007/s11859-010-0315-5
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic ID-based authenticated group key exchange protocol without pairings

Abstract: So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties' ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The KSRP protocol is based on the AKCN algorithm [15] . Correctness proof for this scheme can be presented as follows by referring the style in [28].…”
Section: Correctness Proofmentioning
confidence: 99%
“…The KSRP protocol is based on the AKCN algorithm [15] . Correctness proof for this scheme can be presented as follows by referring the style in [28].…”
Section: Correctness Proofmentioning
confidence: 99%
“…But this protocol requires log n 2 rounds for n numbers of users. Since then, many ID-based group key exchange protocols [7], [10], [11] have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we analyze security of proposed protocol based on some security attributes described in [7]. Implicit Key Authentication.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…They used the twin Diffie-Hellman technique to prove the security of their protocol in the eCK model. In 2010, Xie et al proposed a dynamic authenticated group key exchange (AGKE) protocol [15]. They also announced their protocol is secure in the eCK model.…”
Section: Introductionmentioning
confidence: 99%