2008 IEEE Wireless Communications and Networking Conference 2008
DOI: 10.1109/wcnc.2008.459
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous ID-Based Group Key Agreement for Wireless Networks

Abstract: Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID-based cryptosystem have been proposed for this objective. Though bearing beneficial features like reduced management cost, private key delegation from ID-based cryptosystem, they have not taken into account privacy issues during group communication. In wireless networks, the privacy problem becomes more crucial and urgent for mobile us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 17 publications
0
30
0
Order By: Relevance
“…But this protocol requires log n 2 rounds for n numbers of users. Since then, many ID-based group key exchange protocols [7], [10], [11] have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…But this protocol requires log n 2 rounds for n numbers of users. Since then, many ID-based group key exchange protocols [7], [10], [11] have been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Although the adversary reveals the private key S i , he cannot compute k i because computing r i r i+1 P given <P , r i P , r i+1 P > is hard problem under the ECDH assumption. Therefore, our Tables 1 and 2 show the comparison of Wan et al's protocols [7] and our proposed protocols in performance. We use the following notations:…”
Section: Securitymentioning
confidence: 99%
“…In 2008, Wan et al [7] proposed an anonymous IDbased GKA protocol. Their protocol keeps the advantage of the ID-based cryptosystem and provides anonymity of the identities from outsiders.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It utilized a binary key tree structure and achieves authentication with the ID-based cryptosystem, hence avoids management of certificates. Since then, many ID-based group key exchange protocols [7][8][9][10][11][12][13][14] using bilinear pairings have been proposed. All authors of the protocols above do not analyze whether their protocol can resist the attack of ephemeral private key revealing or not, and all these protocols utilize the bilinear pairings which have an expensive cost when computed.…”
Section: Introductionmentioning
confidence: 99%