Abstract
This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Blom R. Key distribution and key management. InEUROCRYPT’83, Udine, Italy, March, 1983, pp. 34–56.
Mike Burmester, Yvo Desmedt. A secure and efficient conference key distribution system. InAdvances in Cryptology — EUROCRYPT’94, Damgard I B (ed.),Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994 pp. 275–286.
Bennett C H, Brassard G. Quantum cryptography, and its application to provable secure key expansion, public-key distribution, and coin tossing. InInternational Symposium on Information Theory, IEEE Computer Society Press, 1983, p. 91.
Ingemarsson I, Tang D T, Wong D K. A conference key distribution systems.IEEE Trans. Inform. Theory, 1982, 28: 714–720.
Okamoto E. Key distribution systems based on identification information. InAdvances in Cryptology-Crypto’87, Pomerance C (ed.), Lecture Notes in Computer Science 293, Berlin: Springer, 1988, pp. 194–202.
Okamoto E, Tanaka K. Key distribution systems based on identification information.IEEE. J. Selected Areas in Commun., 1989, 7: 481–485.
Michael Steiner, Gene Tsudik, Michael Waidner. CLIQUES: A new approach to group key agreement. InProc. the 18th International Conference on Distributed Computing Systems (ICDCS’98), Amsterdam, IEEE Computer Society Press, May, 1998, pp.380–387.
Giuseppe Ateniese, Michael Steiner, Gene Tsudik. New multiparty authentication services and agreement protocols.IEEE Journal of Selected Areas in Communications, April, 2000, 18(4): 628–639.
Amos Fiat, Moni Naor. Broadcast encryption. InAdvances in Cryptology—CRYPTO’98, Douglas R. Stinson (ed.), Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, Germany, 1993, pp.480–491.
Steer D, Strawczynski L, Diffie W, Wiener M. A secure audio teleconference system. I InAdvances in Cryptology-CRYPTO’88, Goldwasser S (ed.), Santa Barbare, CA, USA, Aug., 1990, Lecture Notes in Computer Science 403, pp.520–528, Springer-Verlag, Berlin, Germany.
Whitfield Diffie, Martin Hellman. New directions in cryptography.IEEE Transactions on Information Theory, Nov., 1976, IT-22(6): 644–654.
Alfred J Menezes, Paul C van Oorschot, Scot A. Vansytone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, 1997, ISBN 0-8493-8523-7.
Jean E. Smith, Fred W Weingarten (eds.). Research challenges for the next generation internet.Computing Research Association, Report from the Workshop on Research Directions for the Next Generation Internet, May, 1997, pp.208–217.
Michael Sterner, Gene Tsudik, Michael Waidner. Diffie-Hellman key distribution extended to groups. InThird ACM Conference on Computer and Communication Security, ACM Press, Mar., 1996, pp.31–37.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the National Natural Science Foundation of China under Grant Nos. 50173032 and 69973031.
ZHENG Dong received the B.S. degree in mathematics from Shanxi Normal University in 1985, the M.S. degree in mathematics from Shaanxi Normal University, Xi’an, in 1988, and the Ph.D. degree from Xidian University, Xi’an, 1999. From 1988 to 1996 he served as a lecturer in the Department of Mathematics, Qinghai Teacher’s College. From September 1996 till September 1999, he worked toward Ph.D. degree in School of Communication Engineering, Xidian University with Prof. Yumin Wang as his supervisor and during 1999–2001 he was a post doctoral researcher in the Department of Computer Science and Engineering of Shanghai Jiaotong University. Since September 2002, he works as an associate professor in Department of Computer Science and Engineering, Shanghai Jiaotong University.
CHEN Kefei received the B.S. and the M.S. degrees in applied mathematics from Xidian University (the former Northwest Telecommunications Engineering Institute), Xi’an, in 1982 and 1985, respectively, and the Ph.D. degree from Justus-Liebig University, Germany, in 1994. He joined Shanghai Jiaotong niversity as an associate professor in 1996, and promoted to his present position as a professor in 1998. He was a vice chairman of Department of Computer Science and Engineering of Shanghai Jiaotong University in 1999, and is currently vice dean of School of Information Security Engineering, director of Cryptography and Information Security Lab. Dr. Chen has been concentrated his work on cryptography and information security, especially in public key cryptography, authentication, digital signature, block cipher, digital watermarking, networks security, electronic commerce, and coding theory etc. He is the author of more than 60 research papers, and he received a National Natural Science Award of China in 1990, and Science and Technology Progress Awards by the Chinese State Commission of Education, in 1989 and 1993, respectively.
YOU Jinyuan is a professor at the Department of Computer Science and Engineering, Shanghai Jiaotong University, director of Shanghai Distributed Computing Technology Center. He graduated from the Department of Automatic Control, Beijing Science and Technology University in 1963. His research area covers operating system design and implementation, distributed computing and mobile computation, software engineering, and middleware technology. He has published many books and more than 60 academic papers.
Rights and permissions
About this article
Cite this article
Zheng, D., Chen, K. & You, J. Multiparty authentication services and key agreement protocols with semi-trusted third party. J. Compt. Sci. & Technol. 17, 749–756 (2002). https://doi.org/10.1007/BF02960765
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02960765