Improving Choi et al.'s ID-based Authenticated Group Key Agreement Scheme at PKC2004

In modern network computing, authenticated group key agreement (AGKA) is important for conferencing. After Shamir [2] proposed the ID-based cryptosystem in 1984, the various applications on the ID-based cryptosystem have been actively studied, due to the simple key management complexity. For the AGKA, Choi et al. [16] proposed an ID-based authenticated group key agreement with bilinear maps, which was extended from Burmester and Desmedt conference key agreement protocol [5]. After that, Zhang and Chen [15] showed that the impersonation attack on Choi et al. protocol is feasible when two malicious users have the previous authentication transcripts of the entity. Shim [19] showed that the insider colluding attacks can be done without the previous transcripts. In this paper, we propose an improved ID-based AGKA. In our scheme, Key Generation Center (KGC) keeps the list of randomized user index instead of only generating private key. The random user indexing means KGC shuffles the order of users’ indices by randomizing to hide it so that the malicious users cannot know the order. KGC also verify all users than only verifies 3 users in Choi et al.’s protocol. Our protocol can prevent replay attack of Zhang and Chen and insider colluding attack of Shim.

[1]  Ratna Dutta,et al.  Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract) , 2003, INDOCRYPT.

[2]  Dong Hoon Lee,et al.  Efficient ID-based Group Key Agreement with Bilinear Maps , 2004, Public Key Cryptography.

[3]  Kyung-Ah Shim Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[5]  Jianhua Li,et al.  ID-based one round authenticated group key agreement protocol with bilinear pairings , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[6]  Ying Wang,et al.  An Improved ID-based Authenticated Group Key Agreement Scheme , 2003, IACR Cryptol. ePrint Arch..

[7]  Routo Terada,et al.  An IBE Scheme to Exchange Authenticated Secret Keys , 2004, IACR Cryptol. ePrint Arch..

[8]  K. C. Reddy,et al.  Identity Based Authenticated Group Key Agreement Protocol , 2002, INDOCRYPT.

[9]  Kwangjo Kim,et al.  Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation , 2000, INDOCRYPT.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Alfred Menezes,et al.  Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.

[12]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  E. Okamoto Proposal for identity-based key distribution systems , 1986 .

[15]  Xiaofeng Chen,et al.  Attack on Two ID-based Authenticated Group Key Agreement Schemes , 2003, IACR Cryptol. ePrint Arch..

[16]  Zhang Ya-juan,et al.  An identity-based key-exchange protocol , 2008, Wuhan University Journal of Natural Sciences.