scholarly journals An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement

Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 112
Author(s):  
Qingnan Chen ◽  
Ting Wu ◽  
Chengnan Hu ◽  
Anbang Chen ◽  
Qiuhua Zheng

Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone. However, the existing schemes do not meet the requirement of batch verification in the group key negotiation phase, which makes the schemes have low efficiency. To address this problem, an identity-based cross-domain authenticated asymmetric group key agreement is proposed that supports batch verification. The performance analysis shows that this protocol is highly efficient. Finally, the proposed protocol is proved to be secure under the k-Bilinear Diffie–Hellman Exponent assumption.

2016 ◽  
Vol 16 (5) ◽  
pp. 559-576 ◽  
Author(s):  
Lei Zhang ◽  
Qianhong Wu ◽  
Bo Qin ◽  
Hua Deng ◽  
Jiangtao Li ◽  
...  

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 24064-24074 ◽  
Author(s):  
Zhang Qikun ◽  
Gan Yong ◽  
Zhang Quanxin ◽  
Wang Ruifang ◽  
Tan Yu-An

Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4835
Author(s):  
Zisang Xu ◽  
Feng Li ◽  
Han Deng ◽  
Minfu Tan ◽  
Jixin Zhang ◽  
...  

With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal resources. The group key directly affects the security of the group communication. Most existing group key agreement protocols are often flawed in performance, scalability, forward or backward secrecy, or single node failure. Therefore, this paper proposes a blockchain-based authentication and dynamic group key agreement protocol. With our protocol, each group member only needs to authenticate its left neighbor once to complete the authentication, which improved authentication efficiency. In addition, our protocol guarantees the forward secrecy of group members after joining the group and the backward secrecy of group members after leaving the group. Based on blockchain technology, we solve the problem of single node failure. Furthermore, we use mathematics to prove the correctness and security of our protocol, and the comparison to related protocols shows that our protocol reduces computation and communication costs.


Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3940
Author(s):  
Vankamamidi S. Naresh ◽  
Moustafa M. Nasralla ◽  
Sivaranjani Reddi ◽  
Iván García-Magariño

Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then we propose a zonal level three-layered system architecture. Further, for effectiveness we introduce a Multi-Agent System (MAS) in this three-layered architecture. Protecting sensitive health information of citizens is a major security concern. Group key agreement (GKA) is the corner stone for securely sharing the healthcare data among the healthcare stakeholders of the city. For establishing GKA, many efficient cryptosystems are available in the classical field. However, they are yet dependent on the supposition that some computational problems are infeasible. In light of quantum mechanics, a new field emerges to share a secret key among two or more members. The unbreakable and highly secure features of key agreement based on fundamental laws of physics allow us to propose a Quantum GKA (QGKA) technique based on renowned Quantum Diffie–Hellman (QDH). In this, a node acts as a Group Controller (GC) and forms 2-party groups with remaining nodes, establishing a QDH-style shared key per each two-party. It then joins these keys into a single group key by means of a XOR-operation, acting as a usual group node. Furthermore, we extend the QGKA to Dynamic QGKA (DQGKA) by adding join and leave protocol. Our protocol performance was compared with existing QGKA protocols in terms of Qubit efficiency (QE), unitary operation (UO), unitary operation efficiency (UOE), key consistency check (KCC), security against participants attack (SAP) and satisfactory results were obtained. The security analysis of the proposed technique is based on unconditional security of QDH. Moreover, it is secured against internal and external attack. In this way, e-healthcare Multi-Agent System can be robust against future quantum-based attacks.


Sign in / Sign up

Export Citation Format

Share Document