TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks |
¿µ¹®Á¦¸ñ(English Title) |
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks |
ÀúÀÚ(Author) |
Dengyong Zhang
Pengjie Wu
Feng Li
Wenjie Zhu
Victor S. Sheng
Huimin Ren
Suhyun Kim
Daehee Seo
Imyeong Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 16 NO. 05 PP. 1687 ~ 1707 (2022. 05) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.
|
Å°¿öµå(Keyword) |
Certificateless
Authenticated group key agreement
One-Round
Pairing-Free
ECC
Impersonation Attacks
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|