Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.2.157

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices  

Cho Seokhyang (성균관대학교 정보통신공학부)
Nam Junghyun (성균관대학교 정보통신공학부)
Kim Seungjoo (성균관대학교 정보통신공학부)
Won Dongho (성균관대학교 정보통신공학부)
Lee Hyejoo (한국전자통신연구원 방송미디어연구그룹)
Choi Jinsoo (한국전자통신연구원 방송미디어연구그룹)
Abstract
Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.
Keywords
그룹 키 동의;모바일 장치;멀티캐스트;계산적 Diffie-Hellman 가정;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Katz and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange,' CRYPTO 2003, LNCS 2729, pp.110-125, 2003
2 C. Boyd and J. M. G. Nieto, 'Round-Optimal Contributory Conference Key Agreement,' PKC 2003, LNCS 2567, pp.161-174, 2003
3 W. Diffie, P. Oorschot, and M. Wiener, 'Authentication and Authenticated Key Exchanges', Designs, Codes, and Cryptography, Vol.2, No.2, pp.107-125, 1992   DOI
4 E. Bresson, O. Chevassut, and D. Pointcheval, 'Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions,' EUROCRYPT 2002, LNCS 2332, pp.321-336, 2002
5 K. Becker and U. Wille, 'Communication Complexity of Group Key Distribution,' Proc. of the 5th ACM Conference on Computer and Communication Security (CCS 1998), pp.1-6, 1998   DOI
6 E. Bresson, O. Chevassut, and D. Pointcheval, 'Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks,' ASIACRYPT 2002, LNCS 2501, pp.497-514, 2002
7 M. Steiner, G. Tsudik, and M. Waidner, 'Key Agreement in Dynamic Peer Groups,' IEEE Transactions on Parallel and Distributed Systems, Vol.11, No.8, pp.769-780, August, 2000   DOI   ScienceOn
8 E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, 'Provably Authenticated Group Diffie-Hellman Key Exchange,' Proc. of the 8th ACM Conference on Computer and Communication Security(CCS 2001), pp. 255-264, 2001   DOI
9 Junghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho Won, 'Simple and Efficient Group Key Agreement based on Factoring,' Proc. of the 2004 International Conference on Computational Science and Its Applications(ICCSA 2004), LNCS 3043, pp.645-654, May, 2004
10 E. Bresson, O. Chevassut, and D. Pointcheval, 'Provably Authenticated Diffie-Hellman Key Exchange-The Dynamic Case,' ASIACRYPT 2001, LNCS 2248, pp.290-309, 2001
11 I. lngemarsson, D. T. Tang, and C. K. Wong, 'A Conference Key Distribution System,' IEEE Transactions on Information Theory, Vol.IT-28, No.5, pp.714-720, September, 1982   DOI
12 M.Goresky and A.Klapper, 'Feedback Registers based on Ramified Extensions of the 2- Adic Numbers,' Advances in Cryptology-CRYPTO'94, LNCS 950, pp.215-222, 1994   DOI
13 M. Steiner, G. Tsudik, and M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' Proc. of the 3rd ACM Conference on Computer and Communication Security(CCS 1996), pp.31-37, March, 1996   DOI
14 Whitfield Diffie and Martin Hellman, 'New Directions in Cryptography,' IEEE Transaction on Information Theory, Vol.IT-22, No.6, pp.644-654, November, 1976   DOI
15 B. Bhargava, M. Annamalai, and E. Pitoura, 'Digital Library Services in Mobile Computing,' ACM SIGMOD Record, Vol.24, No.4, pp.34-39, December, 1995   DOI
16 E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices(Full version),' Proc. of the 5th IEEE International Conference on Mobile and Wireless Communications Networks(MWCN 2003), pp.59-62, World Scientific Publishing, 2003
17 Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won, 'Dynamic Group Key Exchange over High Delay Networks,' Proc. of the International Scientific-Practical Conference on Communication (ISPC COMM 2004), pp.22-29, 2004
18 Y. Huang and H. Garcia-Molina, 'Publish/Subscribe in a Mobile Environment,' Proc. of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access(MobiDE 2001), pp.27-34, 2001
19 T. Phan, L. Huang, and C. Dulan, 'Challenge: Integrating Mobile Wireless Devices into the Computational Grid,' Proc. of the 8th ACM Conference on Mobile Computing and Networking(MOBICOM 2002), pp.271-278, September, 2002   DOI
20 S.-H. Lim and J.-H. Kim, 'Real-time Broadcast Algorithm for Mobile Computing,' The Journal of Systems and Software, Vol.69, No.2, pp.173-181, 2004   DOI   ScienceOn