Cryptology ePrint Archive: Report 2010/209
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer
Abstract: In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we first propose a security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA) protocols. We then propose an IB-AAGKA protocol which is proven secure under the Bilinear Diħe-Hellman Exponent assumption. Our protocol is also efficient, and readily adaptable to provide broadcast encryption.
Category / Keywords: public-key cryptography / Identity-Based Public-Key Cryptography, Group Key Agreement, Asymmetric Group Key Agreement, Bilinear Map.
Publication Info: The 16th Annual International Computing and Combinatorics Conference (COCOON 2010)
Date: received 14 Apr 2010
Contact author: lei zhang at urv cat
Available format(s): PDF | BibTeX Citation
Version: 20100419:174724 (All versions of this report)
Short URL: ia.cr/2010/209
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]