Welcome To WUJNS
武汉大学学报 英文版 | Wuhan University Journal of Natural Sciences
Wan Fang
CNKI
CSCD
Wuhan University
Latest Article
Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near-Rings
Time:2017-11-15  
Devarasan Ezhilmaran, Venkatesan Muthukumaran
School of Advanced Sciences, VIT University, Vellore 632014, Tamilnadu, India
Abstract:
 Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to construct public-key cryptographic protocols. In this article, we propose a new authenticated group key agreement protocol which works in non-abelian near-rings. We have proved that our protocol meets the security attributes under the assumption that the twist conjugacy search problem (TCSP) is hard in near-ring.
Key words:group key agreement protocol; near-rings; twist conjugacy search problem
CLC number:TN 918
References:
[1]	Diffie W, Hellman M. New directions in cryptography [J]. IEEE Transactions on Information Theory, 1976: 644-654.
[2]	Wang S B, Cao Z F, Le C. Efficient certificateless authenti-cated key agreement protocol from pairings [J]. Wuhan University Journal of Natural Sciences, 2006, 11(5): 1278-1282.
[3]	Kim H J, Lee S M, Lee D H. Constant-round authenticated group key exchange for dynamic groups[C]//Advances in Cryptology-ASIACRYPT 2004. Berlin: Springer-Verlag, 2004: 245-259.
[4]	Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols [J]. Selected Areas in Communications, IEEE Journal on, 2000, 18(4): 628-639.
[5]	Lee H K, Lee H S, Lee Y R. An authenticated group key agreement protocol on braid groups [J]. IACR Cryptology ePrint Archive, 2003,(1): 1-9.
[6]	Lu C F, Wu T C, Hsu C L. Certificateless authenticated group key agreement scheme with privacy-preservation for re-source-limited mobile devices [J]. International Journal of Inovative Computing Information and Control, 2012, 8(1): 599-615.
[7]	Fathirad I, Devlin J. On constructing dynamic and forward secure authenticated group key agreement scheme from multikey encapsulation mechanism [J]. The Scientific World Journal, 2015,(6): 1-7.
[8]	Black W S, Menezes A. Authenticated Diffie-Hellman key agreement protocols [C]// Proc of SAC’98. Berlin: Springer- Verlag, 1999, 1556: 339-361.
[9]	Manezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. New York: CRC Press, 1997.
[10]	Satyanarayana B, Prasad K S. Near Rings, Fuzzy Ideals, and Graph Theory [M]. London: Chapman and Hall CRC, 2013.
Welcome To WUJNS

HOME | Aim and Scope | Editoral Board | Current Issue | Back Issue | Subscribe | Crosscheck | Polishing | Contact us Copyright © 1997-2017 All right reserved