{"title":"A improved scheme for authenticated group key exchange","authors":"Jian Shu, Chunxiang Xu","doi":"10.1109/ICACIA.2009.5361154","DOIUrl":null,"url":null,"abstract":"Authenticated group key exchange (AGKE) enable a set of participants in a public network to share a key which can be further used to achieve confidentiality and authentication. Most of the schemes required a linear number of communications round with respect to the number of group members, such schemes are not practical. Others are inefficient being required some additional condition such as central authority or logic structure. After analyzed the security of bresson's protocol, a improved scheme is proposed, which is simple and efficient. The scheme is proven secure under Decisional Diffie-Hellman assumption.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACIA.2009.5361154","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Authenticated group key exchange (AGKE) enable a set of participants in a public network to share a key which can be further used to achieve confidentiality and authentication. Most of the schemes required a linear number of communications round with respect to the number of group members, such schemes are not practical. Others are inefficient being required some additional condition such as central authority or logic structure. After analyzed the security of bresson's protocol, a improved scheme is proposed, which is simple and efficient. The scheme is proven secure under Decisional Diffie-Hellman assumption.