A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...

Full description

Saved in:
Bibliographic Details
Main Authors: Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/367264
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850214713144639488
author Tsu-Yang Wu
Tung-Tso Tsai
Yuh-Min Tseng
author_facet Tsu-Yang Wu
Tung-Tso Tsai
Yuh-Min Tseng
author_sort Tsu-Yang Wu
collection DOAJ
description The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.
format Article
id doaj-art-863046d2e7b24dcea204ce38541288da
institution OA Journals
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-863046d2e7b24dcea204ce38541288da2025-08-20T02:08:49ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/367264367264A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsTsu-Yang Wu0Tung-Tso Tsai1Yuh-Min Tseng2Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen 518055, ChinaDepartment of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, TaiwanDepartment of Mathematics, National Changhua University of Education, Jin-De Campus, Changhua City 500, TaiwanThe existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.http://dx.doi.org/10.1155/2014/367264
spellingShingle Tsu-Yang Wu
Tung-Tso Tsai
Yuh-Min Tseng
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
The Scientific World Journal
title A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_full A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_fullStr A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_full_unstemmed A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_short A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
title_sort provably secure revocable id based authenticated group key exchange protocol with identifying malicious participants
url http://dx.doi.org/10.1155/2014/367264
work_keys_str_mv AT tsuyangwu aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tungtsotsai aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT yuhmintseng aprovablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tsuyangwu provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT tungtsotsai provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants
AT yuhmintseng provablysecurerevocableidbasedauthenticatedgroupkeyexchangeprotocolwithidentifyingmaliciousparticipants