Skip to main content
Log in

Multiparty authentication services and key agreement protocols with semi-trusted third party

  • Regular Papers
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blom R. Key distribution and key management. InEUROCRYPT’83, Udine, Italy, March, 1983, pp. 34–56.

  2. Mike Burmester, Yvo Desmedt. A secure and efficient conference key distribution system. InAdvances in Cryptology — EUROCRYPT’94, Damgard I B (ed.),Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994 pp. 275–286.

    Google Scholar 

  3. Bennett C H, Brassard G. Quantum cryptography, and its application to provable secure key expansion, public-key distribution, and coin tossing. InInternational Symposium on Information Theory, IEEE Computer Society Press, 1983, p. 91.

  4. Ingemarsson I, Tang D T, Wong D K. A conference key distribution systems.IEEE Trans. Inform. Theory, 1982, 28: 714–720.

    Article  MATH  MathSciNet  Google Scholar 

  5. Okamoto E. Key distribution systems based on identification information. InAdvances in Cryptology-Crypto’87, Pomerance C (ed.), Lecture Notes in Computer Science 293, Berlin: Springer, 1988, pp. 194–202.

    Google Scholar 

  6. Okamoto E, Tanaka K. Key distribution systems based on identification information.IEEE. J. Selected Areas in Commun., 1989, 7: 481–485.

    Article  Google Scholar 

  7. Michael Steiner, Gene Tsudik, Michael Waidner. CLIQUES: A new approach to group key agreement. InProc. the 18th International Conference on Distributed Computing Systems (ICDCS’98), Amsterdam, IEEE Computer Society Press, May, 1998, pp.380–387.

    Google Scholar 

  8. Giuseppe Ateniese, Michael Steiner, Gene Tsudik. New multiparty authentication services and agreement protocols.IEEE Journal of Selected Areas in Communications, April, 2000, 18(4): 628–639.

    Article  Google Scholar 

  9. Amos Fiat, Moni Naor. Broadcast encryption. InAdvances in Cryptology—CRYPTO’98, Douglas R. Stinson (ed.), Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, Germany, 1993, pp.480–491.

    Google Scholar 

  10. Steer D, Strawczynski L, Diffie W, Wiener M. A secure audio teleconference system. I InAdvances in Cryptology-CRYPTO’88, Goldwasser S (ed.), Santa Barbare, CA, USA, Aug., 1990, Lecture Notes in Computer Science 403, pp.520–528, Springer-Verlag, Berlin, Germany.

    Google Scholar 

  11. Whitfield Diffie, Martin Hellman. New directions in cryptography.IEEE Transactions on Information Theory, Nov., 1976, IT-22(6): 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  12. Alfred J Menezes, Paul C van Oorschot, Scot A. Vansytone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, 1997, ISBN 0-8493-8523-7.

  13. Jean E. Smith, Fred W Weingarten (eds.). Research challenges for the next generation internet.Computing Research Association, Report from the Workshop on Research Directions for the Next Generation Internet, May, 1997, pp.208–217.

  14. Michael Sterner, Gene Tsudik, Michael Waidner. Diffie-Hellman key distribution extended to groups. InThird ACM Conference on Computer and Communication Security, ACM Press, Mar., 1996, pp.31–37.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Dong.

Additional information

This work was supported by the National Natural Science Foundation of China under Grant Nos. 50173032 and 69973031.

ZHENG Dong received the B.S. degree in mathematics from Shanxi Normal University in 1985, the M.S. degree in mathematics from Shaanxi Normal University, Xi’an, in 1988, and the Ph.D. degree from Xidian University, Xi’an, 1999. From 1988 to 1996 he served as a lecturer in the Department of Mathematics, Qinghai Teacher’s College. From September 1996 till September 1999, he worked toward Ph.D. degree in School of Communication Engineering, Xidian University with Prof. Yumin Wang as his supervisor and during 1999–2001 he was a post doctoral researcher in the Department of Computer Science and Engineering of Shanghai Jiaotong University. Since September 2002, he works as an associate professor in Department of Computer Science and Engineering, Shanghai Jiaotong University.

CHEN Kefei received the B.S. and the M.S. degrees in applied mathematics from Xidian University (the former Northwest Telecommunications Engineering Institute), Xi’an, in 1982 and 1985, respectively, and the Ph.D. degree from Justus-Liebig University, Germany, in 1994. He joined Shanghai Jiaotong niversity as an associate professor in 1996, and promoted to his present position as a professor in 1998. He was a vice chairman of Department of Computer Science and Engineering of Shanghai Jiaotong University in 1999, and is currently vice dean of School of Information Security Engineering, director of Cryptography and Information Security Lab. Dr. Chen has been concentrated his work on cryptography and information security, especially in public key cryptography, authentication, digital signature, block cipher, digital watermarking, networks security, electronic commerce, and coding theory etc. He is the author of more than 60 research papers, and he received a National Natural Science Award of China in 1990, and Science and Technology Progress Awards by the Chinese State Commission of Education, in 1989 and 1993, respectively.

YOU Jinyuan is a professor at the Department of Computer Science and Engineering, Shanghai Jiaotong University, director of Shanghai Distributed Computing Technology Center. He graduated from the Department of Automatic Control, Beijing Science and Technology University in 1963. His research area covers operating system design and implementation, distributed computing and mobile computation, software engineering, and middleware technology. He has published many books and more than 60 academic papers.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zheng, D., Chen, K. & You, J. Multiparty authentication services and key agreement protocols with semi-trusted third party. J. Compt. Sci. & Technol. 17, 749–756 (2002). https://doi.org/10.1007/BF02960765

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02960765

Key words

Navigation