Download now Free registration required
In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the group members merely negotiate a common encryption key which is accessible to any entity, but they hold respective secret decryption keys. In this paper, the authors first propose a security model for Identity-Based Authenticated Asymmetric Group Key Agreement (IB-AAGKA) protocols. They then propose an IB-AAGKA protocol which is proven secure under the Bilinear Diffie-Hellman Exponent assumption. The protocol is also efficient, and readily adaptable to provide broadcast encryption.
- Format: PDF
- Size: 247.9 KB