Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 275496, 7 pages
http://dx.doi.org/10.1155/2015/275496
Research Article

On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism

Department of Electronic Engineering, La Trobe University, Melbourne, VIC 3086, Australia

Received 5 March 2015; Revised 9 August 2015; Accepted 16 August 2015

Academic Editor: Björn Johansson

Copyright © 2015 Iraj Fathirad and John Devlin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. C. Gorantla, C. Boyd, J. M. G. Nieto, and M. Manulis, “Generic one round group key exchange in the standard model,” in Information, Security and Cryptology—ICISC 2009, pp. 1–15, Springer, Berlin, Germany, 2010. View at Google Scholar
  2. E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, “Provably authenticated group Diffie-Hellman key exchange,” in Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255–264, 2001.
  3. E. Bresson, O. Chevassut, and D. Pointcheval, “Dynamic group Diffie-Hellman key exchange under standard assumptions,” in Advances in Cryptology—EUROCRYPT 2002, vol. 2332 of Lecture Notes in Computer Science, pp. 321–336, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  4. E. Bresson, O. Chevassut, and D. Pointcheval, “Provably authenticated group Diffie-Hellman key exchange—the dynamic case,” in Advances in Cryptology—ASIACRYPT 2001, pp. 290–309, Springer, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  5. N. P. Smart, “Efficient key encapsulation to multiple parties,” in Security in Communication Networks, pp. 208–219, Springer, 2005. View at Google Scholar
  6. V. Gupta, S. Gupta, S. Chang, and D. Stebila, “Performance analysis of elliptic curve cryptography for SSL,” in Proceedings of th ACM Workshop on Wireless Security, pp. 87–94, September 2002. View at Scopus
  7. V. Shoup, A Proposal for an ISO Standard for Public Key Encryption (Version 2.1), vol. 112, IACR E-Print Archive, 2001.
  8. R. Cramer and V. Shoup, “Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack,” SIAM Journal on Computing, vol. 33, no. 1, pp. 167–226, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. D. Hofheinz and E. Kiltz, “Secure hybrid encryption from weakened key encapsulation,” in Advances in Cryptology-CRYPTO 2007, pp. 553–571, Springer, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  10. H. Hiwatari, K. Tanaka, T. Asano, and K. Sakumoto, “Multi-recipient public-key encryption from simulators in securitu proofs,” in Information Security and Privacy, pp. 293–308, Springer, 2009. View at Google Scholar
  11. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. View at Google Scholar · View at MathSciNet
  12. A. Joux, “A one round protocol for tripartite Diffie-Hellman,” in Algorithmic Number Theory, pp. 385–393, Springer, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  13. C. Boyd, “Towards a classification of key agreement protocols,” in Proceedings of the 8th IEEE Computer Security Foundations Workshop, pp. 38–43, IEEE, June 1995. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Boyd, “On key agreement and conference key agreement,” in Information Security and Privacy, vol. 1270 of Lecture Notes in Computer Science, pp. 294–302, Springer, Berlin, Germany, 1997. View at Publisher · View at Google Scholar
  15. C. Boyd and J. M. G. Nieto, “Round-optimal contributory conference key agreement,” in Public Key Cryptography—PKC 2003, vol. 2567 of Lecture Notes in Computer Science, pp. 161–174, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  16. D. Boneh and A. Silverberg, “Applications of multilinear forms to cryptography,” Contemporary Mathematics, vol. 324, pp. 71–90, 2003. View at Google Scholar
  17. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, “An efficient protocol for authenticated key agreement,” Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119–134, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. H. Krawczyk, “HMQV: a high-performance secure Diffie-Hellman protocol,” in Advances in Cryptology—CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 546–566, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  19. J.-S. Coron, T. Lepoint, and M. Tibouchi, “Practical multilinear maps over the integers,” in Advances in Cryptology—CRYPTO 2013, vol. 8042 of Lecture Notes in Computer Science, pp. 476–493, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. C. Gentry, S. Gorbunov, and S. Halevi, “Graded multilinear maps from lattices,” Tech. Rep. 2014/645, Cryptology ePrint Archive, 2014, http://eprint.iacr.org/. View at Google Scholar
  21. M. C. Gorantla, Design and analysis of group key exchange protocols [Ph.D. thesis], Queensland University of Technology, Brisbane, Australia, 2010.
  22. J. Katz and M. Yung, “Scalable protocols for authenticated group key exchange,” in Advances in Cryptology—CRYPTO 2003, pp. 110–125, Springer, 2003. View at Google Scholar
  23. R. M. Avanzi, “The complexity of certain multi-exponentiation techniques in cryptography,” Journal of Cryptology, vol. 18, no. 4, pp. 357–373, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. J. Baek, W. Susilo, J. K. Liu, and J. Zhou, “A new variant of the Cramer-Shoup KEM secure against chosen ciphertext attack,” in Applied Cryptography and Network Security, vol. 5536 of Lecture Notes in Computer Science, pp. 143–155, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar