Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network

  • Qikun ZhangEmail author
  • Yongjiao Li
  • Jianyong Li
  • Yong Gan
  • Yanhua Zhang
  • Jingjing Hu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1095)


Group key agreement is one of the key technologies for ensuring information exchange security among group members. It is widely used in secure multiparty computation, resource security sharing, and distributed collaborative computing et al. The current group key agreement requires personal privacy protection, lightweight computing and more efficient and secure group key agreement technology. Aiming at these requirements, this paper proposed a lightweight group key agreement protocol based on blockchain, which uses the technical advantages of blockchain and asymmetric group key agreement combined. In this protocol, the blockchain anonymous authentication technology is used to implement personal privacy protection in the identity authentication process of the group key agreement, and the blockchain decentralized computing technology is adopted to reduce the computational and communication overhead of each participant. So it also suite able to use in resource-constrained mobile network, It also uses blockchain recording techniques for traceability and accountability (if some participants impersonate or falsify data, they can be recorded by the blockchain. No malicious attempts can be made undetected). This protocol is proved secure under the decisional bilinear Diffie-Hellman (DBDH) problem assumption and the performance analysis shows that the proposed scheme is more efficient than existing works.


Group key agreement Blockchain Anonymous authentication Information exchange 



This work is supported by National Natural Science Foundation of China under Grant No. 61772477, 61572445 and U1804263, the Beijing Municipal Natural Science Foundation (No. 4172053), the Natural Science Foundation of Henan Province (No. 162300410322).


  1. 1.
    Lin, T., Hsu, C.: Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. J. Supercomput. 74(9), 4521–4541 (2018)CrossRefGoogle Scholar
  2. 2.
    Tan, Y., Zhang, X., Sharif, K., et al.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018)CrossRefGoogle Scholar
  3. 3.
    Zhang, X., Liang, C., Zhang, Q., et al.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Ranjani, R., Bhaskari, D., Avadhani, P.: An extended identity based authenticated asymmetric group key agreement protocol. IJ Netw. Secur. 17(5), 510–516 (2015)Google Scholar
  5. 5.
    Lv, X., Li, H., Wang, B.: Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3), 447–460 (2014)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Zhang, L., Wu, Q., Domingo-Ferrer, J., et al.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Qikun Zhang
    • 1
    Email author
  • Yongjiao Li
    • 1
  • Jianyong Li
    • 1
  • Yong Gan
    • 2
  • Yanhua Zhang
    • 1
  • Jingjing Hu
    • 3
  1. 1.Computer and Communication EngineeringZhengzhou University of Light IndustryZhengzhouChina
  2. 2.Zhengzhou Institute of TechnologyZhengzhouChina
  3. 3.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina

Personalised recommendations