论文部分内容阅读
ID-based constant-round group key agreement protocols are efficient in both computation and communication,but previous protocols did not provide valid message authentication.An improvement based on attack analysis is proposed in this paper.The improved method takes full advantage of the data transmitted at various stages of the protocol.By guaranteeing the freshness of authentication messages,the authenticity of the generator of authentication messages,and the completeness of the authenticator,the improved protocol can resist various passive and active attacks.The forward secrecy of the improved protocol is proved under a Katz-Yung(KY)model.Compared with existing methods,the improved protocol is more effective and applicable.
ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous previous protocols did not provide valid message authentication. An improvement based on attack analysis is proposed in this paper. The improved method takes full advantage of the data transmitted at various stages of the protocol. BY guaranteeing the freshness of authentication messages, the authenticity of the generator of authentication messages, and the completeness of the authenticator, the improved protocol can resist various passive and active attacks.. The forward secrecy of the improved protocol is proved under a Katz-Yung (KY) model. Compared with existing methods, the improved protocol is more effective and applicable.