Int J Performability Eng ›› 2018, Vol. 14 ›› Issue (11): 2831-2841.doi: 10.23940/ijpe.18.11.p29.28312841

Previous Articles     Next Articles

A Strongly Secure and Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

Haiyan Suna, *, Zengyu Caib, Jianwei Zhanga, Ling Zhanga, and Yong Ganc   

  1. a Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China;
    b School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China;
    c Zhengzhou Institute of Technology, Zhengzhou, 450044, China
  • Submitted on ;
  • Contact: * E-mail address: sunhaiyan2520@163.com
  • About author:Haiyan Sun received her Ph.D. from Beijing University of Posts and Telecommunications in 2014. She currently works at Zhengzhou University of Light Industry. Her research interests include network security and cryptography.Zengyu Cai received his M.S. degree from Northeast Normal University in 2006. He is currently an associate professor at Zhengzhou University of Light Industry. His research interests include trusted computing, plan recognition, and information security.Jianwei Zhang received his Ph.D. from PLA Information Engineering University in 2010. He is currently a professor at Zhengzhou University of Light Industry. His research interests include broadband information networks and information security.Ling Zhang received her Ph.D. from Beijing University of Posts and Telecommunications in 2014. She currently works at Zhengzhou University of Light Industry. Her research interests include intrusion detection and information security.Yong Gan received his M.S. degree from Xi'an Microelectronics Technology Institute in 1989. He is currently a professor at Zhengzhou Institute of Technology. His research interests include information security and blockchain.

Abstract: In Eurocrypt’2009, Wu et al. (2009) presented an important primitive named the asymmetric group key agreement (AGKA) protocol. In such a primitive, a group of users generate a common public encryption key, and each user only holds his own secret decryption key. Authenticated asymmetric group key agreement (AAGKA) protocols are a kind of AGKA protocol that can be secure against active attacks. AAGKA protocols in certificateless public key cryptography (CL-PKC) have some preponderance than those in identity-based cryptography and PKI cryptography. However, existing AAGKA protocols in CL-PKC only consider security against normal type adversaries, the weakest adversaries considered in CL-PKC literature. To solve this problem, an improved security model that considers security against super adversaries and a provably secure certificateless AAGKA protocol under the improved security model are proposed. Efficiency comparison shows that the proposed protocol is more efficient.

Key words: asymmetric group key agreement, provable security, super adversaries, certificateless key cryptography