Abstract
Group communication mechanism provides several participants with a secure and credible communication environment by sharing a confidential group key within group members. Group Diffie-Hellman key exchange protocol (GDH) is an extension of two-party Diffie-Hellman key exchange. Many protocols based on GDH protocol have been proposed, among which AT-GDH protocol is an authenticated group key agreement protocol. AT-GDH2 protocol complements AT-GDH with a dynamic group key updating scheme. This paper proposes an improved dynamic scheme based on AT-GDH after analyzing the security flaws in AT-GDH2 protocol. We name this proposed group key management process as AT-GDH3. Then the security property of AT-GDH3 protocol is analyzed using the strand space and authentication test theory from the aspects of authentication, implicit key authentication, recency, backward security and forward security. The results show that AT-GDH3 protocol can overcome the security flaws in AT-GDH2 protocol, and can guarantee security properties of group key management.
* The project of this paper is supported by the National Science Foundation of China under Grant No.6070204 and the National High-Tech Research Development Program of China (863 program) under Grant No. 2007AA01Z139.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys. 35(2003)309–329.
Y. Amir, Y. Kim, C.Nita-Rotaru, G.Tsudik, On the Performance of Group Key Agreement Protocols, ACM Transactions on Information and System Security. 7(2004)457–488.
W.Diffie,M.E.Hellman, New directions in cryptography,IEEE Trans. on Information Theory. 22(1976)644–654.
M.Steiner,G.Tsudik,M.Waidner, Diffie-Hellman key distribution extended to group communication, In SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security.(1996)31–37.
M. Just, S. Vaudenay, Authenticated multi-party key agreement, In Advances in Cryptology-Proceedings of AsiaCrypt.1163(1996)36–49.
M. Steiner, G. Tsudik, M. Waidner, CLIQUES: A new approach to group key agreement, In Proceedings of IEEE ICDCS’97. (1997)380–387.
W. G. Tzeng, A practical and secure fault-tolerant conference key agreement protocol, In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC’00. 1751(2000)1–13.
E. Bresson, O. Chevassut, D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, In Advances in Cryptology - Proceedings of AsiaCrypt. 2248(2001)290–309.
Y. Kim, A. Perrig, G. Tsudik, Communication-efficient group key agreement, In Proceedings of IFIP-SEC.(2001)229–244.
E. Bresson, O. Chevassut, D. Pointcheval, Dynamic group Diffie-Hellman key exchange under standard assumptions, In Advances in Cryptology - Proceedings of Eurocrypt. 2332(2002)321–336.
E. Bresson, O. Chevassut, D. Pointcheval, Group Diffie-Hellman key exchange secure against dictionary attacks, In Advances in Cryptology - Proceedings of AsiaCrypt. 2501(2002)497–514.
Y. Kim, A. Perrig, G. Tsudik, Tree-based group key agreement, ACM Transactions on Information and System Security(TISSEC).7(2004), 60–96.
O. Pereira, Modelling and security analysis of authenticated group key agreement protocols, PhD thesis,Universite catholique de Louvain, 2003.
Li li, Research on formal analysis and authentication technology of security protocol, PhD thesis, Wuhan university,2004.
F.Fabrega, J.Herzeg, J.Guttman, Strand spaces: why is a security protocol correct, In Proceedings of the 1998 IEEE Symposium on Security and Privacy. (1998)160–171.
J.Guttman, Security protocol design via authentication tests, In Proceedings of the 15th Computer Security Foundations Workshop, (2002)92–10.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Yu, Y., Zhang, A., Tang, J., Chen, H. (2010). A Dynamic Scheme for Authenticated Group Key Agreement Protocol. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_42
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_42
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)