{"title":"具有叛逆者可追溯性的非对称组密钥协议","authors":"Xiufeng Zhao, D. Wei, Hao Wang","doi":"10.1109/CIS.2010.81","DOIUrl":null,"url":null,"abstract":"Recently, the notion of asymmetric group key agreement (ASGKA) was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we propose an ASGKA protocol with traitor traceability. The new scheme achieves most of known security attributes, such as session key secrecy, known-key secrecy and forward secrecy. In addition, the protocol can provide traitor traceability.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Asymmetric Group Key Agreement with Traitor Traceability\",\"authors\":\"Xiufeng Zhao, D. Wei, Hao Wang\",\"doi\":\"10.1109/CIS.2010.81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, the notion of asymmetric group key agreement (ASGKA) was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we propose an ASGKA protocol with traitor traceability. The new scheme achieves most of known security attributes, such as session key secrecy, known-key secrecy and forward secrecy. In addition, the protocol can provide traitor traceability.\",\"PeriodicalId\":420515,\"journal\":{\"name\":\"2010 International Conference on Computational Intelligence and Security\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2010.81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Asymmetric Group Key Agreement with Traitor Traceability
Recently, the notion of asymmetric group key agreement (ASGKA) was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, we propose an ASGKA protocol with traitor traceability. The new scheme achieves most of known security attributes, such as session key secrecy, known-key secrecy and forward secrecy. In addition, the protocol can provide traitor traceability.