Abstract
Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of EGAKA are as follows: Firstly, EGAKA can be built on any general two-party key exchange protocol without relying on a particular one. EGAKA achieves scalability and robustness in heterogenous environments by allowing members to use any available two-party protocol in common and deliberately designed fault-tolerant mechanism in dynamic membership management. Secondly, EGAKA provides extremely efficient member join services in terms of both communication and computation costs which are constant to the group size. This is a very useful property in the scenarios with frequent member addition.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Asokan, N., Ginzboorg, P.: Key Agreement in ad-hoc Networks. Computer Communication Review (2000)
Ateniese, G., Steiner, M., Tsudik, G.: New Multi-party Authentication Services and Key Agreement Protocols. IEEE JSAC on Secure Communication (2000)
Boyd, C., Nieto, J.M.G.: Round-efficient Conference Key Agreement Protocols with Provable Security. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)
Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)
Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Proc. of the 8th ACM CCS 2001 (2001)
Burmester, M., Desmedt, Y.: Towards practical proven secure authenticated key distribution. In: 1st ACM CCS 1993, Fairfax, Virginia. ACM Press, New York (1993)
Burmester, M.: On the Risk of Opening Distributed Keys. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 308–317. Springer, Heidelberg (1994)
Burmester, M., Alexandris, N., Chrissikopoulos, V., Peppes, D.: Efficient and Provably Secure Key Agreement. In: Katsikas, S.K., Gritzalis, D. (eds.) IFIP SEC 1996, pp. 227–236. Chapman Hall, Boca Raton (1996)
Hietalahti, M.: Key Establishment in ad-hoc Networks. Tik-110.501, Seminar on Network Security, HUT TML (2000)
Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)
Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 475. Springer, Heidelberg (2001)
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: ACM CCS 2000 (2000)
Kobara, K., Imai, H.: Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions. IEICE Trans. E85-A, 2229–2237 (2002)
Kwon, T.: Authentication and Key Agreement via Memorable Passwords. In: Proc. of NDSS 2001 (2001)
McGrew, D., Sherman, A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees (1998), http://www.cs.umbc.edu/sherman/itse.ps
Lee, S., Kim, Y., Kim, K., Ryu, D.: An Efficient Tree-based Group Key Agreement using Bilinear map. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 357–371. Springer, Heidelberg (2003)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1997)
Pereira, O., Quisquater, J.: A Security Analysis of the Cliques Protocols Suites. In: 14th IEEE CSFW 2001, Cape Breton, Novia Scotia, Canada (2001)
Perrig, A., Song, D., Tygar, D.: ELK, a New Protocol for Efficient Large- Group Key Distribution. In: Proc. of IEEE Security and Privacy Symposium S&P 2001 (2001)
Perrig, A., Kim, Y., Tsudik, G.: Communication-Efficient Group Key Agreement. In: International Federation for Information Processing IFIP SEC 2001 (2001)
Reddy, K.C., Nalla, D.: Identity Based Authenticated Group Key Agreement Protocol. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 215–233. Springer, Heidelberg (2002)
Smith, J., Weingarten, F. (eds.): Research Challenges for the Next Generation Internet. In: Workshop on Research Directions for the Next Generation Internet (1997)
Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A Secure Audio Teleconference System. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (2000)
Tzeng, W., Tzeng, Z.: Round-efficient Conference Key Agreement Protocols with Provable Security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architecture. Internet Draft, draft-wallner-key-arch-00.txt (June 1997)
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)
Yang, W., Shieh, S.: Secure Key Agreement for Group Communications. ACM/PH International Journal of Network Management 11(6) (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, K., Lee, H., Kim, K., Yoo, T. (2005). Efficient Authenticated Key Agreement Protocol for Dynamic Groups. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)