• 제목/요약/키워드: Pairing-based cryptography

검색결과 38건 처리시간 0.019초

동적 피어 그룹을 위한 삼진 트리방식의 인증된 그룹 키 합의 프로토콜 (A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group)

  • 김호희;김순자
    • 정보보호학회논문지
    • /
    • 제22권6호
    • /
    • pp.1253-1263
    • /
    • 2012
  • 그룹응용이 늘어감에 따라 효율적인 인증 그룹 키 합의 프로토콜이 많은 관심을 받고 있다. Lee et al.는 삼진트리 구조와 pairing기반의 암호방식을 가진 트리기반의 그룹 키 합의 프로토콜을 제안했다. 그들의 프로토콜은, 모든 멤버들의 세션랜덤 키를 아는 오직 한 명의 그룹 스폰서가 블라인드 키들을 계산한다. 또, 그 스폰서가 그룹을 떠나면, 트리의 모든 정보가 바뀌어져야 한다. 본 논문에서 제안하는 프로토콜은 여러 명의 스폰서를 두었고, 각 멤버의 비밀정보가 그룹스폰서에게 알려지지 않으므로 그룹스폰서가 떠났을 때, 키 갱신이 Lee et al.의 프로토콜보다 훨씬 효율적이다. 그러므로, 제안된 프로토콜은 동적 피어 그룹에 적합하다.

피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜 (ID-Based Group Key Management Protocols for Dynamic Peer Groups)

  • 박영호;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제7권7호
    • /
    • pp.922-933
    • /
    • 2004
  • 최근 분산 시스템이나 협업 시스템을 위한 피어 투 피어(Peer-to-Peer) 네트워크에 대한 연구가 진행되고 있으며 암호학 분야에서는 pairing을 이용한 ID 기반의 공개키 암호 기법에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 동적 피어 그룹(Dynamic Peer Group, DPG) 멤버간의 안전한 그룹통신을 위한 ID 기반의 그룹키 관리 기법을 제안한다. 각 멤버들은 Private Key Generator(PKG)로부터 자신의 ID에 대한 공개키/개인키쌍을 발급 받으나, 그룹키를 관리하기 위한 중앙 관리개체를 이용하지 않고 멤버들간의 협력(collaboration)을 통해 자발적으로 그룹키를 관리함으로써 중앙 관리개체의 오류에 대한 문제(single-point of failure)를 예방할 수 있다. 그리고 동적 피어 그룹의 성질을 고려하여 멤버의 참여와 탈퇴에 대한 그룹키의 비밀성을 제공한다.

  • PDF

Identity-Based Multiple Key Agreement Scheme

  • Dehkordi, Massoud Hadian;Alimoradi, Reza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권12호
    • /
    • pp.2392-2402
    • /
    • 2011
  • In order to protect some important information communicated through an insecure network, a common hidden key must be used. One can produce the common hidden key using key agreement protocols; and this helps to have high security in modern data networks. Today, the designers of public key cryptography protocols try to set the public identity of a system's users (like their email addresses) as their public key. This not only makes a cryptographic protocol more efficient but also decreases its cost. These protocols are called "identity-based". In this article, an identity-based multiple key agreement scheme will be presented; this scheme uses the challenge-response method to do the verification. While the number of random values produced in our scheme is the same as other schemes, the number of keys generated in this scheme is much more than what many other key agreement schemes produce,. Therefore, we will have less computational complexities campered with other schems. In this paper, we consider the security of our scheme and consequently, we will show that it satisfies many security conditions such as strong security.

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권5호
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

Public key broadcast encryption scheme using new converting method

  • Jho, Nam-Su;Yoo, Eun-Sun;Rhee, Man-Young
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.199-206
    • /
    • 2008
  • Broadcast encryption is a cryptographical primitive which is designed for a content provider to distribute contents to only privileged qualifying users through an insecure channel. Anyone who knows public keys can distribute contents by means of public key broadcast encryption whose technique can also be applicable to many other applications. In order to design public key broadcast encryption scheme, it should devise some methods that convert a broadcast encryption scheme based on symmetric key cryptosystem to a public key broadcast encryption. Up to this point, broadcast encryption scheme on trial for converting from symmetric key setting to asymmetric public key setting has been attempted by employing the Hierarchical Identity Based Encryption (HIBE) technique. However, this converting method is not optimal because some of the properties of HIBE are not quite fitting for public key broadcast schemes. In this paper, we proposed new converting method and an efficient public key broadcast encryption scheme Pub-PI which is obtained by adapting the new converting method to the PI scheme [10]. The transmission overhead of the Pub-PI is approximately 3r, where r is the number of revoked users. The storage size of Pub-PI is O($c^2$), where c is a system parameter of PI and the computation cost is 2 pairing computations.

An Escrow-Free Two-party Identity-based Key Agreement Protocol without Using Pairings for Distinct PKGs

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권3호
    • /
    • pp.168-175
    • /
    • 2013
  • Key escrow is a default property that is inherent in identity-based cryptography, where a curious private key generator (PKG) can derive a secret value shared by communicating entities in its domain. Therefore, a dishonest PKG can encrypt and decrypt ciphers or can carry out any attack on the communicating parties. Of course, the escrow property is not completely unwanted but is acceptable in other particular applications. On the other hand, in more civil applications, this key escrow property is undesirable and needs to be removed to provide maximum communication privacy. Therefore, this paper presents an escrow-free identity-based key agreement protocol that is also applicable even in a distinct PKG condition that does not use pairings. The proposed protocol has comparable computational and communicational performance to many other protocols with similar security attributes, of which their security is based on costly bilinear pairings. The protocol's notion was inspired by McCullagh et al. and Chen-Kudla, in regard to escrow-free and multi-PKG key agreement ideas. In particular, the scheme captures perfect forward secrecy and key compromise impersonation resilience, which were lacking in McCullagh et al.'s study, as well as all other desirable security attributes, such as known key secrecy, unknown key-share resilience and no-key control. The merit in the proposed protocol is the achievement of all required security requirements with a relatively lower computational overhead than many other protocols because it precludes pairings.

  • PDF

효율성을 개선한 신원기반의 3자간 복수 키 합의 프로토콜 (An Efficiency Improved ID-based Tripartite Key Agreement Protocol)

  • 박영호;이경현
    • 정보보호학회논문지
    • /
    • 제15권3호
    • /
    • pp.77-89
    • /
    • 2005
  • Pairing을 이용한 신원기반의 공개키 암호시스템에 대한 연구가 활발히 진행되면서 신원기반의 다양한 키 합의 프로토콜이 제안되었으나, 대부분의 기법들이 키 합의 프로토콜에서 요구되는 보안 요구사항을 만족하지 않는 것으로 분석되었다. 그리고 최근 Liu 등과 Kim 등은 한 번의 프로토콜의 수행을 통해 복수개의 키를 설정할 수 있는 키 합의 프로토콜을 제안하였다. 본 논문에서는 Liu 등의 기법을 개선한 신원기반의 3자간 복수개의 키 합의 프로토콜을 제안한다. Liu 등의 기법과 유사하게 키 교환 메시지에 서명을 추가하지만 Liu 등의 기법보다 효율적인 프로토콜의 수행이 가능하다. 그리고 제안 프로토콜은 서로 다른 여러 키 발급센터(Private key generator, PKG)들이 관여하는 환경에서도 프로토콜의 수행이 가능하며, 프로토콜에 참여하는 각 개체들이 자신의 소속에 따라 별개의 키 발급센터로부터 발행된 개인키를 사용할 수 있으므로 보다 실용적이며 효율적으로 적용될 수 있다.