A Note on Group Authentication Schemes

Full Text (PDF, 623KB), PP.18-24

Views: 0 Downloads: 0

Author(s)

Mohsen Pourpouneh 1,* Rasoul Ramezanian 2 Afshin Zarei 3

1. Department of Mathematical Sciences, Sharif University of Technology‎, ‎Tehran‎, ‎Iran

2. Department of Mathematical Sciences, Ferdowsi University of Mashhad‎, Mashhad, ‎Iran

3. Department of Mathematical Sciences, Isfahan University of Technology‎, ‎Isfahan, ‎Iran

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.05.03

Received: 16 Aug. 2015 / Revised: 6 Nov. 2015 / Accepted: 15 Jan. 2016 / Published: 8 May 2016

Index Terms

Key agreement, Group authentication, Conference Key

Abstract

In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every agents that has access to the group key is an eligible member. In this paper, we informally classify different group authentication schemes, based on how the agents authenticate each other and provide examples of each class. We then improve one of the well-known key establishment protocol to an authenticated version according so that it meets one of our notions of group authentication.

Cite This Paper

Mohsen Pourpouneh, Rasoul Ramezanian, Afshin Zarei, "A Note on Group Authentication Schemes", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.5, pp.18-24, 2016. DOI:10.5815/ijcnis.2016.05.03

Reference

[1]Dieter Gollmann. What do we mean by entity authentication? In IEEE Symposium on Security and Privacy, pages 46-54. IEEE Computer Society Press, 1996.
[2]Paul Syverson and Paul C. van Oorschot. On unifying some cryptographic protocol logics. In IEEE Symposium on Research in Security and Privacy, pages 14-28. IEEE Computer Society Press, 1994.
[3]Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
[4]Gavin Lowe. A hierarchy of authentication specification. In 10th IEEE Computer Security Foundations Workshop, pages 31-43. IEEE Computer Society Press, June 1997.
[5]L. Harn, C. Lin, Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Trans. Computers, vol. 59, no. 6, pp. 842-846, June. 2010.
[6]W. Diffie and M.E. Hellman,\ New Directions in Cryptography, IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
[7]I. Ingemarsson, D.T. Tang, and C.K. Wong, A Conference Key Distribution System, IEEE Trans. Information Theory, vol. IT-28, no. 5, pp. 714-720, Sept. 1982.
[8]D.G. Steer, L. Strawczynski, W. Diffie, and M.J. Wiener, A Secure Audio Teleconference System, Proc. Eighth Ann. International Cryptology Conf. Advances in Cryptology (Crypto 88), pp. 520-528, 1988.
[9]M. Burmester and Y.G. Desmedt, A Secure and Efficient Conference Key Distribution System, Proc. Eurocrypt 94 Workshop Advances in Cryptology, pp. 275-286, 1994.
[10]M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, Proc. Third ACM Conf. Computer and Comm. Security (CCS 96), pp. 31-37, 1996.
[11]E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, Provably Authenticated Group Diffie-Hellman Key Exchange, Proc. ACM Conf. Computer and Comm. Security (CCS 01), pp. 255-264, 2001.
[12]J.M. Bohli, A Framework for Robust Group Key Agreement, Proc. International Conf. Computational Science and Applications (ICCSA 06), pp. 355-364, 2006.
[13]J. Katz and M. Yung, Scalable Protocols for Authenticated Group Key Exchange, J. Cryptology, vol. 20, pp. 85-113, 2007.
[14]Shahrokh Saeednia and Rei Safavi-Naini. Efficient identity-based conference key distribution protocols. In C. Boyd et aI., editors, Information Security and Privacy - Third Australasian Conference, pages 320-331. Springer-Verlag, 1998. Lecture Notes in Computer Science Volume 1438.
[15]Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. Authenticated group key agreement and friends. In 5th ACM Conference on Computer and Communications Security, pages 17-26. ACM Press, 1998.
[16]Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications, 18(4):628-639, April 2000.
[17]Boyd, Colin A., and Anish Mathuria. Protocols for key establishment and authentication. Springer-Verlag New York, Inc., 2003.
[18]Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-Hellman key distribution extended to group communication. In 3rd ACM Conference on Computer and Communications Security, pages 31-37. ACM Press, 1996.
[19]Y. Kim, A. Perrig, and G. Tsudik. Communication Efficient group Key Agreement. IFIP SEC, June 2001.
[20]B. Klein, M. Otten, and T. Beth. Conference key distribution protocols in distributed systems. In P. G. Farrell, editor, Codes and Cyphers - Cryptography and Coding $IV$,page 225-241. IMA, 1995.
[21]Cremers, Cas JF. \textquotedblleft The Scyther Tool: Verification, falsification, and analysis of security protocols." In Computer Aided Verification, pp. 414-418. Springer Berlin Heidelberg, 2008.
[22]CH. V. Raghavendran,G. Naga Satish,P. Suresh Varma,"A Study on Contributory Group Key Agreements for Mobile Ad Hoc Networks", IJCNIS, vol.5, no.4, pp.48-56,2013.DOI: 10.5815/ijcnis.2013.04.07.