Constant-round authenticated group key exchange for dynamic groups

Hyun Jeong Kim, Su Mi Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingChapter

89 Citations (Scopus)

Abstract

An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptographic goals. In the paper, we study AGKE schemes for dynamically changing groups in ad hoc networks, i.e., for environments such that a member of a group may join and/or leave at any given time and a group key is exchanged without the help of any central sever. Difficulties in group key managements under such environments are caused by dynamically changing group and existence of no trustee. In most AGKE schemes proposed so far in the literature, the number of rounds is linear with respect to the number of group members. Such schemes are neither scalable nor practical since the number of group members may be quite large and the efficiency of the schemes is severely degraded with only one member's delay. We propose an efficient provably secure AGKE scheme with constant-round. The propose scheme is still contributory and efficient, where each user executes three modular exponentiations and at most O(n) XOR operations.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsPil Joong Lee, Pil Joong Lee
PublisherSpringer Verlag
Pages245-259
Number of pages15
ISBN (Print)3540239758, 9783540239758
DOIs
Publication statusPublished - 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3329
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Ad hoc networks
  • Dynamic authenticated group key exchange

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Constant-round authenticated group key exchange for dynamic groups'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. J., Lee, S. M., & Lee, D. H. (2004). Constant-round authenticated group key exchange for dynamic groups. In P. J. Lee, & P. J. Lee (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 245-259). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3329). Springer Verlag. https://doi.org/10.1007/978-3-540-30539-2_18