An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks

  • Elisavet Konstantinou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


We present an authenticated ID-based Group Key Agreement (GKA) protocol which requires only one round for its execution. The protocol is contributory, energy-balanced and does not require an online TTP. All these properties and in particular the minimum round requirement, makes the protocol especially suited for ad hoc networks. In the paper, we will demonstrate the security properties of the new GKA protocol and present its communication/computation efficiency. Finally, we will compare the new protocol with all the one-round GKA protocols proposed so far in the literature and show that it outperforms all the ID-based protocols of this category.


Group key agreement Constant round ID-based cryptography Ad hoc networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Silverberg, A.: Applications of Multilinear Forms to Cryptography. In: Contemporary Mathematics, pp. 71–90, AMS (2003)Google Scholar
  4. 4.
    Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  6. 6.
    Choi, K.Y., Hwang, J.Y., Lee, D.-H.: Efficient ID-based Group Key Agreement with Bilinear Maps. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 130–144. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Desmedt, Y., Lange, T., Burmester, M.: Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 104–118. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Desmedt, Y., Lange, T.: Revisiting Pairing Based Group Key Exchange. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 53–68. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based Authenticated Two Round Multi-Party Key Agreement. Cryptology ePrint Archive, Report 2003/247 (2003)Google Scholar
  10. 10.
    Du, X., Wang, Y., Ge, J., Wang, Y.: ID-based Authenticated Two Round Multi-Party Key Agreement. Cryptology ePrint Archive, Report 2003/260 (2003)Google Scholar
  11. 11.
    Gorantla, M.C., Boyd, C., Nieto, J.M.G.: One round group key exchange with forward security in the standard model. IACR Cryptology ePrint Archive, Report 2010/83 (2010)Google Scholar
  12. 12.
    He, Y.Z., Han, Z.: An efficient authenticated group key agreement protocol. In: 41st Annual IEEE International Carnahan Conference on Security Technology, pp. 250–254 (2007)Google Scholar
  13. 13.
    Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Kim, J.-S., Kim, H.-C., Ha, K.-J., Yoo, K.-Y.: One Round Identity-Based Authenticated Conference Key Agreement Protocol. In: Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds.) ECUMN 2004. LNCS, vol. 3262, pp. 407–416. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Lee, H.M., Ha, K.J., Ku, K.-M.: ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 104–117. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Li, L.C., Tsai, Y.P., Liu, R.S.: A Novel ID-based Authenticated Group Key Agreement Protocol Using Bilinear Pairings. In: International Conference on Wireless and Optical Communication Networks - WOCN 2008. IEEE Press (2008)Google Scholar
  17. 17.
    Manulis, M.: Survey on Security Requirements and Models for Group Key Exchange. Technical Report TR-HGI-2006-002, Ruhr-Universität Bochum (2008)Google Scholar
  18. 18.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  19. 19.
    Shi, Y., Chen, G., Li, J.: ID-based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. In: International Conference on Information Technology: Coding and Computing - ITCC 2005, pp. 757–761 (2005)Google Scholar
  20. 20.
    Singh, M., Prasanna, V.: Energy-optimal and energy-balanced sorting in a single-hop wireless sensor network. In: 1st IEEE International Conference on Pervasive Computing and Comminications (PERCOM 2003), pp. 50–59 (2003)Google Scholar
  21. 21.
    Teng, J.K., Wu, C.K., Tang, C.M.: An ID-based authenticated dynamic group key agreement with optimal round. Science China Information Sciences 55(11), 2542–2554 (2012)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Tzeng, W.-G., Tzeng, Z.-J.: Round-Efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  23. 23.
    Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  24. 24.
    Xia, M., He, M., Xie, L.: A New ID-based Group Key Agreement Protocol for the Network. Journal of Computational Information Systems 5(6), 1855–1860 (2009)Google Scholar
  25. 25.
    Zaverucha, G.M., Stinson, D.R.: Group Testing and Batch Verification. IACR Cryptology ePrint Archive, Report 2009/240 (2009)Google Scholar
  26. 26.
    Zhang, F., Chen, X.: Attack on two ID-based authenticated group key agreement schemes. IACR Cryptology ePrint Archive, Report 2003/259 (2003)Google Scholar
  27. 27.
    Zhang, F., Chen, X.: Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Information Processing Letters 91, 191–193 (2004)Google Scholar
  28. 28.
    Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  29. 29.
    Zhou, L., Susilo, W., Mu, Y.: Efficient ID-based Authenticated Group Key Agreement from Bilinear Pairings. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 521–532. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Elisavet Konstantinou
    • 1
  1. 1.Department of Information & Communication Systems EngineeringUniversity of the AegeanKarlovassiGreece

Personalised recommendations