Skip to main content

An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Abstract

We present an authenticated ID-based Group Key Agreement (GKA) protocol which requires only one round for its execution. The protocol is contributory, energy-balanced and does not require an online TTP. All these properties and in particular the minimum round requirement, makes the protocol especially suited for ad hoc networks. In the paper, we will demonstrate the security properties of the new GKA protocol and present its communication/computation efficiency. Finally, we will compare the new protocol with all the one-round GKA protocols proposed so far in the literature and show that it outperforms all the ID-based protocols of this category.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Boneh, D., Silverberg, A.: Applications of Multilinear Forms to Cryptography. In: Contemporary Mathematics, pp. 71–90, AMS (2003)

    Google Scholar 

  4. Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  6. Choi, K.Y., Hwang, J.Y., Lee, D.-H.: Efficient ID-based Group Key Agreement with Bilinear Maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 130–144. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Desmedt, Y., Lange, T., Burmester, M.: Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 104–118. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Desmedt, Y., Lange, T.: Revisiting Pairing Based Group Key Exchange. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 53–68. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based Authenticated Two Round Multi-Party Key Agreement. Cryptology ePrint Archive, Report 2003/247 (2003)

    Google Scholar 

  10. Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based Authenticated Two Round Multi-Party Key Agreement. Cryptology ePrint Archive, Report 2003/260 (2003)

    Google Scholar 

  11. Gorantla, M.C., Boyd, C., Nieto, J.M.G.: One round group key exchange with forward security in the standard model. IACR Cryptology ePrint Archive, Report 2010/83 (2010)

    Google Scholar 

  12. He, Y.Z., Han, Z.: An efficient authenticated group key agreement protocol. In: 41st Annual IEEE International Carnahan Conference on Security Technology, pp. 250–254 (2007)

    Google Scholar 

  13. Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Kim, J.-S., Kim, H.-C., Ha, K.-J., Yoo, K.-Y.: One Round Identity-Based Authenticated Conference Key Agreement Protocol. In: Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds.) ECUMN 2004. LNCS, vol. 3262, pp. 407–416. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Lee, H.M., Ha, K.J., Ku, K.-M.: ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 104–117. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Li, L.C., Tsai, Y.P., Liu, R.S.: A Novel ID-based Authenticated Group Key Agreement Protocol Using Bilinear Pairings. In: International Conference on Wireless and Optical Communication Networks - WOCN 2008. IEEE Press (2008)

    Google Scholar 

  17. Manulis, M.: Survey on Security Requirements and Models for Group Key Exchange. Technical Report TR-HGI-2006-002, Ruhr-Universität Bochum (2008)

    Google Scholar 

  18. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  19. Shi, Y., Chen, G., Li, J.: ID-based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. In: International Conference on Information Technology: Coding and Computing - ITCC 2005, pp. 757–761 (2005)

    Google Scholar 

  20. Singh, M., Prasanna, V.: Energy-optimal and energy-balanced sorting in a single-hop wireless sensor network. In: 1st IEEE International Conference on Pervasive Computing and Comminications (PERCOM 2003), pp. 50–59 (2003)

    Google Scholar 

  21. Teng, J.K., Wu, C.K., Tang, C.M.: An ID-based authenticated dynamic group key agreement with optimal round. Science China Information Sciences 55(11), 2542–2554 (2012)

    Article  MathSciNet  Google Scholar 

  22. Tzeng, W.-G., Tzeng, Z.-J.: Round-Efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  23. Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  24. Xia, M., He, M., Xie, L.: A New ID-based Group Key Agreement Protocol for the Network. Journal of Computational Information Systems 5(6), 1855–1860 (2009)

    Google Scholar 

  25. Zaverucha, G.M., Stinson, D.R.: Group Testing and Batch Verification. IACR Cryptology ePrint Archive, Report 2009/240 (2009)

    Google Scholar 

  26. Zhang, F., Chen, X.: Attack on two ID-based authenticated group key agreement schemes. IACR Cryptology ePrint Archive, Report 2003/259 (2003)

    Google Scholar 

  27. Zhang, F., Chen, X.: Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Information Processing Letters 91, 191–193 (2004)

    Google Scholar 

  28. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  29. Zhou, L., Susilo, W., Mu, Y.: Efficient ID-based Authenticated Group Key Agreement from Bilinear Pairings. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 521–532. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konstantinou, E. (2013). An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics