An ID-based authenticated group key agreement (AGKA) protocol allows a group of members to share a key and
provide an assurance of key sharing with an intended group with the user's identity, which is used for conferencing
environments. In 2004, Choi et al proposed an ID-based authenticated group key agreement with bilinear maps (also
called CHL protocols), which was extended from Burmester and Desmedt conference key agreement protocols.
Unfortunately, their protocols were found to be vulnerable to the insider attacks in which cases that the two malicious
users have the previous authentication transcripts of the party by Zhang, Chen and Shim. In this paper, we proposed an
improved ID-based AGKA. In our scheme, each session has a unique session identity which is published by Key
Generation Center. With such unique session identity binding to each session, our protocols can prevent the insider
attack. Especially, our protocols can not enhance the computationally cost and it is still efficient.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.