Paper 2010/209
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang, Qianhong Wu, Bo Qin, and Josep Domingo-Ferrer
Abstract
In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we first propose a security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA) protocols. We then propose an IB-AAGKA protocol which is proven secure under the Bilinear Di±e-Hellman Exponent assumption. Our protocol is also efficient, and readily adaptable to provide broadcast encryption.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. The 16th Annual International Computing and Combinatorics Conference (COCOON 2010)
- Keywords
- Identity-Based Public-Key CryptographyGroup Key AgreementAsymmetric Group Key AgreementBilinear Map.
- Contact author(s)
- lei zhang @ urv cat
- History
- 2010-04-19: received
- Short URL
- https://ia.cr/2010/209
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/209, author = {Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer}, title = {Identity-Based Authenticated Asymmetric Group Key Agreement Protocol}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/209}, year = {2010}, url = {https://eprint.iacr.org/2010/209} }