Paper
13 January 2012 Identity-based group key exchange protocols resistant to colluding attacks
Author Affiliations +
Abstract
An ID-based authenticated group key agreement (AGKA) protocol allows a group of members to share a key and provide an assurance of key sharing with an intended group with the user's identity, which is used for conferencing environments. In 2004, Choi et al proposed an ID-based authenticated group key agreement with bilinear maps (also called CHL protocols), which was extended from Burmester and Desmedt conference key agreement protocols. Unfortunately, their protocols were found to be vulnerable to the insider attacks in which cases that the two malicious users have the previous authentication transcripts of the party by Zhang, Chen and Shim. In this paper, we proposed an improved ID-based AGKA. In our scheme, each session has a unique session identity which is published by Key Generation Center. With such unique session identity binding to each session, our protocols can prevent the insider attack. Especially, our protocols can not enhance the computationally cost and it is still efficient.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yunjie Jiang "Identity-based group key exchange protocols resistant to colluding attacks", Proc. SPIE 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis, 83491F (13 January 2012); https://doi.org/10.1117/12.920354
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Machine vision

Computer engineering

Computer science

Current controlled current source

Digital Light Processing

Genetic algorithms

Image processing

RELATED CONTENT

Adaptive graph construction for Isomap manifold learning
Proceedings of SPIE (March 16 2015)
Model recommendation for pedestrian detection
Proceedings of SPIE (August 29 2016)
Constructing near-tight wavelet frames by neural networks
Proceedings of SPIE (October 23 1996)
Disparity estimation by reverse fuzzyfication
Proceedings of SPIE (October 01 2011)

Back to Top