Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication

Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of information) are key issues to be solved in group key agreement. Aiming at these problems, this paper proposes a group key agreement protocol based on privacy protection and attribute authentication (GKA-PPAA). The protocol proposes identity authentication for hidden attributes; it not only preserves the advantages of traditional identity-based key agreement protocol, but also provides hiding the identity information and privacy protection of the individual, and also proposes information sharing access control, which different secret information is shared among a set of members who have different levels of authority. It increases the flexibility of group key management. In addition, the group key factors are also calculated before the group key agreement, which eliminates most of the computation overhead due to the group key agreement. This protocol is proven secure under the discrete logarithm problem (DLP) and decisional bilinear Diffie-Hellman (DBDH) problem assumptions. The performance analysis shows that the proposed scheme is much more efficient than the existing ones.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[3]  Klara Nahrstedt,et al.  Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..

[4]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[5]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[6]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[7]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[8]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[9]  Josep Domingo-Ferrer,et al.  Identity-Based Authenticated Asymmetric Group Key Agreement Protocol , 2010, COCOON.

[10]  Jun Shao,et al.  Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol , 2012, KSII Trans. Internet Inf. Syst..

[11]  Yuan,et al.  Alliance-Authentication Protocol in Clouds Computing Environment , 2012 .

[12]  Baocang Wang,et al.  Authenticated asymmetric group key agreement based on certificateless cryptosystem , 2014, Int. J. Comput. Math..

[13]  Ma,et al.  An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks , 2014 .

[14]  Lei Zhang,et al.  Certificateless and identity-based authenticated asymmetric group key agreement , 2017, International Journal of Information Security.

[15]  Jianwei Liu,et al.  A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks , 2016, IEICE Trans. Inf. Syst..

[16]  Mu Han,et al.  A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET , 2016, KSII Trans. Internet Inf. Syst..

[17]  Liehuang Zhu,et al.  Cross-cluster asymmetric group key agreement for wireless sensor networks , 2018, Science China Information Sciences.

[18]  Muhammad Bilal,et al.  A secure key agreement protocol for dynamic group , 2017, Cluster Computing.

[19]  Emin Anarim,et al.  A secure and efficient group key agreement approach for mobile ad hoc networks , 2017, Ad Hoc Networks.

[20]  Chun-Ta Li,et al.  A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps , 2018, IEEE Access.

[21]  Chien-Lung Hsu,et al.  Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps , 2018, The Journal of Supercomputing.

[22]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[23]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[24]  Yu Zhang,et al.  Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..

[25]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[26]  Konstantinos Markantonakis,et al.  A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks , 2018, 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC).

[27]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[28]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[29]  Yong Gan,et al.  An Authentication Key Establish Protocol for WSNs Based on Combined Key , 2018, Wirel. Pers. Commun..

[30]  Xiaojiang Du,et al.  Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.

[31]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[32]  Jie Cui,et al.  HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs , 2018, Veh. Commun..

[33]  B. B. Gupta,et al.  Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices , 2018, Int. J. E Serv. Mob. Appl..

[34]  Yong Gan,et al.  A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.

[35]  Lu Liu,et al.  An authenticated asymmetric group key agreement based on attribute encryption , 2018, J. Netw. Comput. Appl..

[36]  Chen Liang,et al.  An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.

[37]  Xiaosong Zhang,et al.  Multi-domain Lightweight Asymmetric Group Key Agreement , 2018 .

[38]  Yong Chen,et al.  Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs , 2018, Wirel. Commun. Mob. Comput..

[39]  Brij B. Gupta,et al.  Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges , 2018 .

[40]  Yuanzhang Li,et al.  A Specific-Targeting Asymmetric Group Key Agreement for Cloud Computing , 2018 .

[41]  Chen Liang,et al.  Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.

[42]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[43]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[44]  Yuanzhang Li,et al.  A Covert Channel Over VoLTE via Adjusting Silence Periods , 2018, IEEE Access.

[45]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[46]  Qing Yang,et al.  A Secure and Efficient Group Key Agreement Scheme for VANET , 2019, Sensors.

[47]  Xiaohui Kuang,et al.  Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.

[48]  Yuanzhang Li,et al.  A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.

[49]  Yue Zhang,et al.  APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..

[50]  Gaurav Sharma,et al.  On the Security of Authenticated Group Key Agreement Protocols , 2019, Scalable Comput. Pract. Exp..

[51]  Lu Liu,et al.  A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..

[52]  Rajeev Anand Sahu,et al.  A twofold group key agreement protocol for NoC-based MPSoCs , 2019, Trans. Emerg. Telecommun. Technol..