Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol

In 2008, Gang Yao et al. proposed an authenticated 3-round identity-based group key agreement protocol, which is based on Burmester and Desmedt’s protocol proposed at Eurocrypt 94. However, their protocol can only prevent passive attack. If the active attack is allowed, the protocol is vulnerable and an internal attacker can forge her neighbor’s keying material. It is obvious that the protocol do not achieve the aim of authentication. In this paper, we discuss the flaws to attack this protocol and propose an enhanced provably-secure protocol based on their protocol. At last, we make a detailed security analysis of our enhanced authenticated identity-based group key agreement protocol.

[1]  Sandeep S. Kulkarni,et al.  Key-update distribution in secure group communication , 2010, Comput. Commun..

[2]  Zhenfu Cao,et al.  A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..

[3]  Dong Hoon Lee,et al.  Security weakness in an authenticated group key agreement protocol in two rounds , 2008, Comput. Commun..

[4]  Bok-Min Goi,et al.  An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model , 2008, EuroPKI.

[5]  Dawu Gu,et al.  An efficient fault-tolerant group key agreement protocol , 2010, Comput. Commun..

[6]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[7]  Zhenfu Cao,et al.  A New ID-Based Deniable Authentication Protocol , 2007, Informatica.

[8]  Hu Liang,et al.  Certificateless Authenticated Key Agreement Protocol against KCI and KRA , 2011, 2011 International Conference on Network Computing and Information Security.

[9]  Jianhong Zhang,et al.  An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme , 2009, ISA.

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Ting Yi Chang An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks , 2009, Comput. Commun..

[12]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[13]  Dongdai Lin,et al.  An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[14]  Cheng-Chi Lee,et al.  On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs , 2010, ICCSA.

[15]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[16]  Yalin Chen,et al.  A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..