Sciweavers

Share
COCOON
2010
Springer

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol

10 years 4 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we first propose a security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA) protocols. We then propose an IB-AAGKA protocol which is proven secure under the Bilinear DiffieHellman Exponent assumption.
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr
Added 19 Jul 2010
Updated 19 Jul 2010
Type Conference
Year 2010
Where COCOON
Authors Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
Comments (0)
books