Skip to main content

Efficient Authenticated Key Agreement Protocol for Dynamic Groups

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Abstract

Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of EGAKA are as follows: Firstly, EGAKA can be built on any general two-party key exchange protocol without relying on a particular one. EGAKA achieves scalability and robustness in heterogenous environments by allowing members to use any available two-party protocol in common and deliberately designed fault-tolerant mechanism in dynamic membership management. Secondly, EGAKA provides extremely efficient member join services in terms of both communication and computation costs which are constant to the group size. This is a very useful property in the scenarios with frequent member addition.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asokan, N., Ginzboorg, P.: Key Agreement in ad-hoc Networks. Computer Communication Review (2000)

    Google Scholar 

  2. Ateniese, G., Steiner, M., Tsudik, G.: New Multi-party Authentication Services and Key Agreement Protocols. IEEE JSAC on Secure Communication (2000)

    Google Scholar 

  3. Boyd, C., Nieto, J.M.G.: Round-efficient Conference Key Agreement Protocols with Provable Security. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proc. of the 8th ACM CCS 2001 (2001)

    Google Scholar 

  7. Burmester, M., Desmedt, Y.: Towards practical proven secure authenticated key distribution. In: 1st ACM CCS 1993, Fairfax, Virginia. ACM Press, New York (1993)

    Google Scholar 

  8. Burmester, M.: On the Risk of Opening Distributed Keys. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 308–317. Springer, Heidelberg (1994)

    Google Scholar 

  9. Burmester, M., Alexandris, N., Chrissikopoulos, V., Peppes, D.: Efficient and Provably Secure Key Agreement. In: Katsikas, S.K., Gritzalis, D. (eds.) IFIP SEC 1996, pp. 227–236. Chapman Hall, Boca Raton (1996)

    Google Scholar 

  10. Hietalahti, M.: Key Establishment in ad-hoc Networks. Tik-110.501, Seminar on Network Security, HUT TML (2000)

    Google Scholar 

  11. Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 475. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: ACM CCS 2000 (2000)

    Google Scholar 

  14. Kobara, K., Imai, H.: Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions. IEICE Trans. E85-A, 2229–2237 (2002)

    Google Scholar 

  15. Kwon, T.: Authentication and Key Agreement via Memorable Passwords. In: Proc. of NDSS 2001 (2001)

    Google Scholar 

  16. McGrew, D., Sherman, A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees (1998), http://www.cs.umbc.edu/sherman/itse.ps

  17. Lee, S., Kim, Y., Kim, K., Ryu, D.: An Efficient Tree-based Group Key Agreement using Bilinear map. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 357–371. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  19. Pereira, O., Quisquater, J.: A Security Analysis of the Cliques Protocols Suites. In: 14th IEEE CSFW 2001, Cape Breton, Novia Scotia, Canada (2001)

    Google Scholar 

  20. Perrig, A., Song, D., Tygar, D.: ELK, a New Protocol for Efficient Large- Group Key Distribution. In: Proc. of IEEE Security and Privacy Symposium S&P 2001 (2001)

    Google Scholar 

  21. Perrig, A., Kim, Y., Tsudik, G.: Communication-Efficient Group Key Agreement. In: International Federation for Information Processing IFIP SEC 2001 (2001)

    Google Scholar 

  22. Reddy, K.C., Nalla, D.: Identity Based Authenticated Group Key Agreement Protocol. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 215–233. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  23. Smith, J., Weingarten, F. (eds.): Research Challenges for the Next Generation Internet. In: Workshop on Research Directions for the Next Generation Internet (1997)

    Google Scholar 

  24. Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A Secure Audio Teleconference System. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)

    Google Scholar 

  25. Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (2000)

    Google Scholar 

  26. Tzeng, W., Tzeng, Z.: Round-efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  27. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architecture. Internet Draft, draft-wallner-key-arch-00.txt (June 1997)

    Google Scholar 

  28. Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  29. Yang, W., Shieh, S.: Secure Key Agreement for Group Communications. ACM/PH International Journal of Network Management 11(6) (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, K., Lee, H., Kim, K., Yoo, T. (2005). Efficient Authenticated Key Agreement Protocol for Dynamic Groups. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics