A Pairing Free Certificateless Group Key Agreement Protocol with Constant Round

  • Abhimanyu KumarEmail author
  • Sachin Tripathi
  • Priyanka Jaiswal
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)


To allow a secure conversation among a group of members over a public network there is a need of group key agreement protocol which provide a group session key used in necessary cryptographic operations. Nowadays the protocols based on the certificateless public key cryptography (CL-PKC) creating more attraction for research because it does not require certificates to authenticates the public key as like ID- based cryptosystem and unlike ID based cryptosystem, it does not suffers from the key escrow problem. The almost all CL-PKC based group key agreement schemes in current literature are employ bilinear pairing in their operations. Since the relative computation cost of pairing is many times more than the elliptic curve point multiplication, so it motivates the researchers to propose pairing free protocols based on the CL-PKC. The present paper propose an efficient pairing free group key agreement protocol based on certificateless cryptography over elliptic curve group with their security and performance analysis. The analysis shows that the proposed protocol has strong security protection against various kinds of attack and involves comparatively lower computation and communication overheads than the other existing protocols.


Group Key Agreement Certificateless Public Key Cryptography ECC Bilinear Pairing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Teng, J., Wu, C.: A provable authenticated certificateless group key agreement with constant rounds. Journal of Communications and Networks 14, 104–110 (2012)CrossRefGoogle Scholar
  3. 3.
    Geng, M., Zhang, F., Gao, M.: A secure certificateless authenticated group key agreement protocol. In: International Conference on Multimedia Information Networking and Security, pp. 342–346 (2009)Google Scholar
  4. 4.
    Heo, S., Kim, Z., Kim, K.: Certificateless authenticated group key agreement protocol for dynamic groups. In: IEEE Global Telecommunications Conference, pp. 464–468 (2007)Google Scholar
  5. 5.
    Lee, E.J., Lee, S.E., Yoo, K.Y.: A certificateless authenticated group key agreement protocol providing forward secrecy. In: Proceedings of the 2008 International Symposium on Ubiquitous Multimedia Computing, pp. 124–129 (2008)Google Scholar
  6. 6.
    Cao, C., Ma, J., Moon, S.: Provable efficient certificateless group key exchange protocol. Wuhan University Journal of Natural Sciences 12, 41–45 (2007)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Xie, L., He, M.: A dynamic id-based authenticated group key exchange protocol without pairings. Wuhan University Journal of Natural Sciences 15, 255–260 (2010)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  9. 9.
    Reddy, K., Nalla, D.: Identity based authenticated group key agreement protocol. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 215–233. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Konstantinou, E.: An efficient constant round id-based group key agreement protocol for ad hoc networks. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 563–574. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  11. 11.
    Wan, Z., Ren, K., Lou, W., Preneel, B.: Anonymous id-based group key agreement for wireless networks. In: IEEE Wireless Communications and Networking Conference, pp. 2615–2620 (2008)Google Scholar
  12. 12.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson Education (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Abhimanyu Kumar
    • 1
    Email author
  • Sachin Tripathi
    • 1
  • Priyanka Jaiswal
    • 1
  1. 1.Department of Computer Science & EngineeringIndian School of MinesDhanbadIndia

Personalised recommendations