A novel mathematical model for group communication with trusted key generation and distribution using shamir's secret key and USB security

Authentication and confidentiality are two sides of a coin. A group communication is said to be secure only if it preserve both authentication and confidentiality. A group communication is secure if every member of the group is a trusted person. Hence, individual security leads to group security. This paper proposes a new method for secure group communication by providing individual security, in which each group is assigned with a one-time session key. In order to maximize individual security each user uses USB key together with his user name and password. This paper make use of shamir's secret sharing algorithm for creation of the share for each member of the participating group in communication, and Lagrangs interpolation formula for construction of key for the share by each member in the group. The proposed protocol is able to resist both insider and outsider attack.

[1]  Tao Jiang,et al.  An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013, IEEE Transactions on Computers.

[2]  Meng Gao,et al.  A Secure Certificateless Authenticated Group Key Agreement Protocol , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[3]  Xukai Zou,et al.  DGKD: distributed group key distribution with authentication capability , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[4]  Dengguo Feng,et al.  A Complete Anonymous Group Key Agreement Protocol , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[5]  Yu-Fang Chung,et al.  A conference key agreement protocol with fault-tolerant capability , 2009, Comput. Stand. Interfaces.

[6]  Lein Harn,et al.  Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.

[7]  Emmanuel Bresson,et al.  Security proofs for an efficient password-based key exchange , 2003, CCS '03.

[8]  Jonathan Katz,et al.  Scalable Protocols for Authenticated Group Key Exchange , 2003, Journal of Cryptology.

[9]  Wei Yuan,et al.  Security and Improvement of an Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013 .