Cargando…

A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Tsu-Yang, Tsai, Tung-Tso, Tseng, Yuh-Min
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058815/
https://www.ncbi.nlm.nih.gov/pubmed/24991641
http://dx.doi.org/10.1155/2014/367264
_version_ 1782321172982005760
author Wu, Tsu-Yang
Tsai, Tung-Tso
Tseng, Yuh-Min
author_facet Wu, Tsu-Yang
Tsai, Tung-Tso
Tseng, Yuh-Min
author_sort Wu, Tsu-Yang
collection PubMed
description The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.
format Online
Article
Text
id pubmed-4058815
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-40588152014-07-02 A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants Wu, Tsu-Yang Tsai, Tung-Tso Tseng, Yuh-Min ScientificWorldJournal Research Article The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. Hindawi Publishing Corporation 2014 2014-06-01 /pmc/articles/PMC4058815/ /pubmed/24991641 http://dx.doi.org/10.1155/2014/367264 Text en Copyright © 2014 Tsu-Yang Wu et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Wu, Tsu-Yang
Tsai, Tung-Tso
Tseng, Yuh-Min
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_full A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_fullStr A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_full_unstemmed A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_short A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_sort provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058815/
https://www.ncbi.nlm.nih.gov/pubmed/24991641
http://dx.doi.org/10.1155/2014/367264
work_keys_str_mv AT wutsuyang aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tsaitungtso aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tsengyuhmin aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT wutsuyang provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tsaitungtso provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tsengyuhmin provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants