Title | Dynamic asymmetric group key agreement protocol with traitor traceability |
Publication Type | Journal Article |
Year of Publication | 2019 |
Authors | Teng, Jikai, Ma, Hongyang |
Journal | IET Information Security |
Volume | 13 |
Pagination | 703—710 |
ISSN | 1751-8717 |
Keywords | asymmetric group key agreement protocols, black box encryption, black-box tracing algorithm, common encryption key, composability, cryptographic protocols, D k-HDHE assumption, dynamic asymmetric group key agreement protocol, dynamic authenticated ASGKA protocol, Eurocrypt 2009, forward secrecy, IND-CPA security, join algorithm, KCIR, key compromise impersonation resilience, leave algorithm, Metrics, one-round dynamic authenticated ASGKA protoco, pairwise different decryption key computation, protocol resists collusion attack, pubcrawl, Public key, public traitor traceability, resilience, Resiliency, setup algorithm |
Abstract | In asymmetric group key agreement (ASGKA) protocols, a group of users establish a common encryption key which is publicly accessible and compute pairwise different decryption keys. It is left as an open problem to design an ASGKA protocol with traitor traceability in Eurocrypt 2009. A one-round dynamic authenticated ASGKA protocol with public traitor traceability is proposed in this study. It provides a black-box tracing algorithm. Ind-CPA security with key compromise impersonation resilience (KCIR) and forward secrecy of ASGKA protocols is formally defined. The proposed protocol is proved to be Ind-CPA secure with KCIR and forward secrecy under D k-HDHE assumption. It is also proved that the proposed protocol resists collusion attack. In Setup algorithm and Join algorithm, one communication round is required. In Leave algorithm, no message is required to be transmitted. The proposed protocol adopts O(log N)-way asymmetric multilinear map to make the size of public key and the size of ciphertext both achieve O(logN), where N is the number of potential group members. This is the first ASGKA protocol with public traitor traceability which is more efficient than trivial construction of ASGKA protocols. |
DOI | 10.1049/iet-ifs.2019.0177 |
Citation Key | teng_dynamic_2019 |