Journal of Computer Science and Technology

, Volume 17, Issue 6, pp 749–756 | Cite as

Multiparty authentication services and key agreement protocols with semi-trusted third party

Regular Papers


This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.

Key words

secure key establishment authentication group communication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Blom R. Key distribution and key management. InEUROCRYPT’83, Udine, Italy, March, 1983, pp. 34–56.Google Scholar
  2. [2]
    Mike Burmester, Yvo Desmedt. A secure and efficient conference key distribution system. InAdvances in Cryptology — EUROCRYPT’94, Damgard I B (ed.),Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994 pp. 275–286.Google Scholar
  3. [3]
    Bennett C H, Brassard G. Quantum cryptography, and its application to provable secure key expansion, public-key distribution, and coin tossing. InInternational Symposium on Information Theory, IEEE Computer Society Press, 1983, p. 91.Google Scholar
  4. [4]
    Ingemarsson I, Tang D T, Wong D K. A conference key distribution systems.IEEE Trans. Inform. Theory, 1982, 28: 714–720.MATHCrossRefMathSciNetGoogle Scholar
  5. [5]
    Okamoto E. Key distribution systems based on identification information. InAdvances in Cryptology-Crypto’87, Pomerance C (ed.), Lecture Notes in Computer Science 293, Berlin: Springer, 1988, pp. 194–202.Google Scholar
  6. [6]
    Okamoto E, Tanaka K. Key distribution systems based on identification information.IEEE. J. Selected Areas in Commun., 1989, 7: 481–485.CrossRefGoogle Scholar
  7. [7]
    Michael Steiner, Gene Tsudik, Michael Waidner. CLIQUES: A new approach to group key agreement. InProc. the 18th International Conference on Distributed Computing Systems (ICDCS’98), Amsterdam, IEEE Computer Society Press, May, 1998, pp.380–387.Google Scholar
  8. [8]
    Giuseppe Ateniese, Michael Steiner, Gene Tsudik. New multiparty authentication services and agreement protocols.IEEE Journal of Selected Areas in Communications, April, 2000, 18(4): 628–639.CrossRefGoogle Scholar
  9. [9]
    Amos Fiat, Moni Naor. Broadcast encryption. InAdvances in Cryptology—CRYPTO’98, Douglas R. Stinson (ed.), Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, Germany, 1993, pp.480–491.Google Scholar
  10. [10]
    Steer D, Strawczynski L, Diffie W, Wiener M. A secure audio teleconference system. I InAdvances in Cryptology-CRYPTO’88, Goldwasser S (ed.), Santa Barbare, CA, USA, Aug., 1990, Lecture Notes in Computer Science 403, pp.520–528, Springer-Verlag, Berlin, Germany.Google Scholar
  11. [11]
    Whitfield Diffie, Martin Hellman. New directions in cryptography.IEEE Transactions on Information Theory, Nov., 1976, IT-22(6): 644–654.MATHCrossRefMathSciNetGoogle Scholar
  12. [12]
    Alfred J Menezes, Paul C van Oorschot, Scot A. Vansytone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, 1997, ISBN 0-8493-8523-7.Google Scholar
  13. [13]
    Jean E. Smith, Fred W Weingarten (eds.). Research challenges for the next generation internet.Computing Research Association, Report from the Workshop on Research Directions for the Next Generation Internet, May, 1997, pp.208–217.Google Scholar
  14. [14]
    Michael Sterner, Gene Tsudik, Michael Waidner. Diffie-Hellman key distribution extended to groups. InThird ACM Conference on Computer and Communication Security, ACM Press, Mar., 1996, pp.31–37.Google Scholar

Copyright information

© Science Press, Beijing China and Allerton Press Inc. 2002

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringShanghai Jiaotong UniversityShanghaiP.R. China

Personalised recommendations