Skip to main content

Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

A novel identity-based authenticated group key agreement (ID-AGKA) protocol is proposed to implement secure group communication in space information network. Cluster-based hierarchical mechanism is applied to generate group session key through the intra-cluster phase, inter-cluster phase and key distribution phase. Not only is the cost of establishment and management in public key infrastructure reduced, but also the dynamic situations that satellite node joins or exits the group are supported in the proposed protocol. Authentication, forward and backward secrecy and semantic security are proved under difficult mathematical problem assumptions. Compared with the previous ID-AGKA protocols, the proposed protocol has lower computation complexity and communication cost, and achieves optimal overall performance for space information network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)

    Article  Google Scholar 

  3. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)

    Article  Google Scholar 

  4. Tsai, J.L.: A novel authenticated group key agreement protocol for mobile environment. Ann. Telecommun. 66(11), 663–669 (2011)

    Article  Google Scholar 

  5. You, Z.Y., Xie, X.Y.: A novel group key agreement protocol for wireless mesh network. Computers and Electrical Engineering 37(2), 218–239 (2011)

    Article  MATH  Google Scholar 

  6. Park, C., Hur, J., Hwang, S., Yoon, H.: Authenticated public key broadcast encryption scheme secure against insiders’ attack. Mathematical and Computer Modelling 55(2), 113–122 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Xiong, H., Chen, Z., Qin, Z.G.: Efficient three-party authenticated key agreement protocol in certificateless cryptography. International Journal of Computer Mathematics 88(13), 2707–2716 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  8. Hlbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences 78(1), 142–150 (2012)

    Article  MathSciNet  Google Scholar 

  9. Cheng, Q.F., Ma, C.G., Wei, F.S.: Analysis and improvement of a new authenticated group key agreement in a mobile environment. Ann. Telecommun. 66, 331–337 (2011)

    Article  Google Scholar 

  10. Tan, Z.W.: Efficient identity-based authenticated multiple key exchange protocol. Computers and Electrical Engineering 37, 191–198 (2011)

    Article  MATH  Google Scholar 

  11. Chuang, Y.H., Tseng, Y.M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int. J. Network Mgmt. 20(4), 167–180 (2010)

    Google Scholar 

  12. Zhao, X.W., Zhang, F.G., Tian, H.B.: Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5), 928–939 (2011)

    Article  Google Scholar 

  13. Sood, S.K., Sarje, A.K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications 34(2), 609–618 (2011)

    Article  Google Scholar 

  14. Guo, H., Li, Z.J., Mu, Y., Zhang, F.: An efficient dynamic authenticated key exchange protocol with selectable identities. Computers and Mathematics with Applications 61(9), 2518–2527 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  15. Wang, K., Zhao, Z.W., Yao, L.: An agile reconfigurable key distribution scheme in space information network. In: Proceedings of Second IEEE Conference on Industrial Electronics and Applications, Harbin, China, pp. 2742–2747 (2007)

    Google Scholar 

  16. Zhong, Y.T., Ma, J.F.: Efficient secure group key exchange protocol in space information networks. Journal of Jilin University (Engineering and Technology Edition) 42(1), 203–206 (2012)

    MathSciNet  Google Scholar 

  17. Guo, Y.B., Wang, C., Wang, L.M.: Universally composable authentication and key exchange protocol for access control in spatial information networks. Acta Electronica Sinica 38(10), 2358–2364 (2010)

    Google Scholar 

  18. Cao, S., Zhang, C.R., Song, C.Y.: Identity-base dynamic authenticated group key agreement protocol for mobile networks. Journal of Air Force Engineering University (Natural Science Edition) 12(5), 67–71 (2011)

    Google Scholar 

  19. Choi, K.Y., Hwang, J.Y., Lee, D.-H.: Efficient ID-based group key agreement with bilinear maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 130–144. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based authenticated two Round multi-party key agreement. Cryptology ePrint Archive: Report 2003/247

    Google Scholar 

  21. Lin, C.H., Lin, H.H., Chang, J.H.: Multiparty key agreement for secure teleconferencing. In: IEEE International Conference on Systems, Man and Cybernetics, ICSMC 2006, pp. 3702–3707 (2006)

    Google Scholar 

  22. Tang, H., Zhu, L., Zhang, Z.: Efficient ID-based two round authenticated group key agreement protocol. In: WiCOM 2008: 4th International Conference on Wireless Communication, Networking and Mobile Computering, pp. 1–4. IEEE press, New York (2008)

    Chapter  Google Scholar 

  23. Li, L.C., Tsai, Y.P., Liu, R.S.: A Novel ID-based authenticated group key agreement protocol using bilinear pairings. In: WOCN 2008: 5th IEEE and IFIP International Conference on Wireless and Optical Communications Networks (2008)

    Google Scholar 

  24. Barua, R., Dutta, R., Sarkar, P.: Extending joux’s protocol to multi party key agreement. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 205–217. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  25. Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  26. Zhang, F.G., Chen, X.F.: Attack on two ID-based authenticated group key agreement schemes. Cryptology ePrint Archive: Report 2003/259 (2003)

    Google Scholar 

  27. Shim, K.A.: Further analysis of ID-based authenticated group key agreement protocl from bilinear maps. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences 90(1), 288–295 (2007)

    Google Scholar 

  28. Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  29. Boneh, D., Franklin, M.: Identity-based encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, C., Mao, K., Liu, J., Liu, J. (2013). Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics