Cargando…
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058815/ https://www.ncbi.nlm.nih.gov/pubmed/24991641 http://dx.doi.org/10.1155/2014/367264 |
_version_ | 1782321172982005760 |
---|---|
author | Wu, Tsu-Yang Tsai, Tung-Tso Tseng, Yuh-Min |
author_facet | Wu, Tsu-Yang Tsai, Tung-Tso Tseng, Yuh-Min |
author_sort | Wu, Tsu-Yang |
collection | PubMed |
description | The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. |
format | Online Article Text |
id | pubmed-4058815 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-40588152014-07-02 A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants Wu, Tsu-Yang Tsai, Tung-Tso Tseng, Yuh-Min ScientificWorldJournal Research Article The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. Hindawi Publishing Corporation 2014 2014-06-01 /pmc/articles/PMC4058815/ /pubmed/24991641 http://dx.doi.org/10.1155/2014/367264 Text en Copyright © 2014 Tsu-Yang Wu et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Wu, Tsu-Yang Tsai, Tung-Tso Tseng, Yuh-Min A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title_full | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title_fullStr | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title_full_unstemmed | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title_short | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
title_sort | provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058815/ https://www.ncbi.nlm.nih.gov/pubmed/24991641 http://dx.doi.org/10.1155/2014/367264 |
work_keys_str_mv | AT wutsuyang aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tsaitungtso aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tsengyuhmin aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT wutsuyang provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tsaitungtso provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tsengyuhmin provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants |