A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | The Scientific World Journal |
| Online Access: | http://dx.doi.org/10.1155/2014/367264 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850214713144639488 |
|---|---|
| author | Tsu-Yang Wu Tung-Tso Tsai Yuh-Min Tseng |
| author_facet | Tsu-Yang Wu Tung-Tso Tsai Yuh-Min Tseng |
| author_sort | Tsu-Yang Wu |
| collection | DOAJ |
| description | The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. |
| format | Article |
| id | doaj-art-863046d2e7b24dcea204ce38541288da |
| institution | OA Journals |
| issn | 2356-6140 1537-744X |
| language | English |
| publishDate | 2014-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | The Scientific World Journal |
| spelling | doaj-art-863046d2e7b24dcea204ce38541288da2025-08-20T02:08:49ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/367264367264A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsTsu-Yang Wu0Tung-Tso Tsai1Yuh-Min Tseng2Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen 518055, ChinaDepartment of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, TaiwanDepartment of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, TaiwanThe existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.http://dx.doi.org/10.1155/2014/367264 |
| spellingShingle | Tsu-Yang Wu Tung-Tso Tsai Yuh-Min Tseng A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants The Scientific World Journal |
| title | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
| title_full | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
| title_fullStr | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
| title_full_unstemmed | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
| title_short | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants |
| title_sort | provably secure revocable id based authenticated group key exchange protocol with identifying malicious participants |
| url | http://dx.doi.org/10.1155/2014/367264 |
| work_keys_str_mv | AT tsuyangwu aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tungtsotsai aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT yuhmintseng aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tsuyangwu provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT tungtsotsai provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants AT yuhmintseng provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants |