Title: An authenticated hierarchical asymmetric group key agreement protocol based on identity

Authors: Yong Gan; Bingli Wang; Yuan Zhuang; Zengyu Cai; Qikun Zhang

Addresses: School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China; Zhengzhou Institute of Technology, Zhengzhou, 450044, China ' School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China ' School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China ' School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China ' School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China

Abstract: Asymmetric group key agreement protocol is to negotiate a shared group encryption key. Each member can calculate a decryption key corresponding to the encryption key. With the rapid development of network and system technology, secure information exchange has been one of the foci. In this paper, we propose an authenticated hierarchical asymmetric group key agreement protocol based on identity. Based on the realisation of a round of asymmetric group key agreement, the protocol carries out a second round of agreement. Different levels of secrets exchange information between a group of players with different permissions as the number of rounds increases, which can achieve anonymity and authentication and support dynamic group key updating of nodes to achieve forward and backward security of group key. The protocol proved to be secure under the assumption of bilinear computational Diffie-Hellman problem. The performance analysis shows that the proposed scheme is efficient.

Keywords: group key agreement; asymmetric; dynamic group; authentication; hierarchical structure.

DOI: 10.1504/IJES.2019.104006

International Journal of Embedded Systems, 2019 Vol.11 No.6, pp.815 - 824

Received: 09 Jun 2019
Accepted: 05 Jul 2019

Published online: 02 Dec 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article