• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
¿µ¹®Á¦¸ñ(English Title) A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
ÀúÀÚ(Author) Dengyong Zhang   Pengjie Wu   Feng Li   Wenjie Zhu   Victor S. Sheng   Huimin Ren   Suhyun Kim   Daehee Seo   Imyeong Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 05 PP. 1687 ~ 1707 (2022. 05)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.
Å°¿öµå(Keyword) Certificateless   Authenticated group key agreement   One-Round   Pairing-Free   ECC   Impersonation Attacks  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå