Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol

作者: Jiangtao Li , Lei Zhang

DOI: 10.1016/J.INS.2017.06.003

关键词: Broadcast encryptionNon-repudiationCommunication sourceGroup keyGroup (mathematics)Protocol (object-oriented programming)Computer scienceKey (cryptography)Computer security

摘要: Abstract Establishing a secure communication channel among group of individuals is critical issue in oriented applications. In implementation, besides the basic confidentiality requirement, we also expect communications to be sender dynamic, forward secure, non-repudiable and privacy preserving. Traditional approaches, i.e., key agreement broadcast encryption cannot achieve above requirements simultaneously efficiently. this paper, propose our solution using new security tool called identity based asymmetric protocol with non-reputation privacy. The notion allows users negotiate common their respective decryption keys. After that, inside/outside who have knowledge are able send privacy-preserving messages confidentially. Further, even all users’ private keys later corrupted, broadcasted previously remain secure. Following definition, concrete which proven against chosen-ciphertext attacks (CCA) directly. We show potential applications instant messaging applications, such as Whatsapp, Wechat, Messenger.

参考文章(49)
Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y Zomaya, None, ID2S Password-Authenticated Key Exchange Protocols IEEE Transactions on Computers. ,vol. 65, pp. 1- 1 ,(2016) , 10.1109/TC.2016.2553031
Shaoquan Jiang, Group Key Agreement with Local Connectivity IEEE Transactions on Dependable and Secure Computing. ,vol. 13, pp. 326- 339 ,(2016) , 10.1109/TDSC.2015.2399299
Dan Boneh, Alice Silverberg, Applications of Multilinear Forms to Cryptography. IACR Cryptology ePrint Archive. ,vol. 2002, pp. 80- ,(2002)
Zhaoqing Pan, Jianjun Lei, Yun Zhang, Xingming Sun, Sam Kwong, Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder IEEE Transactions on Broadcasting. ,vol. 62, pp. 675- 684 ,(2016) , 10.1109/TBC.2016.2580920
Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi, Certificateless and identity-based authenticated asymmetric group key agreement International Journal of Information Security. ,vol. 16, pp. 559- 576 ,(2017) , 10.1007/S10207-016-0339-8
Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong, Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud IEEE Transactions on Information Forensics and Security. ,vol. 11, pp. 2572- 2583 ,(2016) , 10.1109/TIFS.2016.2587242
Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response IEEE Transactions on Computers. ,vol. 65, pp. 2562- 2574 ,(2016) , 10.1109/TC.2015.2485225
Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min, Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage IEEE Transactions on Information Forensics and Security. ,vol. 12, pp. 767- 778 ,(2017) , 10.1109/TIFS.2016.2615853
Jian Liu, Jiangtao Li, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen, Secure intelligent traffic light control using fog computing Future Generation Computer Systems. ,vol. 78, pp. 817- 824 ,(2018) , 10.1016/J.FUTURE.2017.02.017
Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo, An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data IEEE Transactions on Information Forensics and Security. ,vol. 12, pp. 2402- 2415 ,(2017) , 10.1109/TIFS.2017.2705620