Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near-Rings
Devarasan Ezhilmaran, Venkatesan MuthukumaranSchool of Advanced Sciences, VIT University, Vellore 632014, Tamilnadu, India
Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to construct public-key cryptographic protocols. In this article, we propose a new authenticated group key agreement protocol which works in non-abelian near-rings. We have proved that our protocol meets the security attributes under the assumption that the twist conjugacy search problem (TCSP) is hard in near-ring.
Key words:group key agreement protocol; near-rings; twist conjugacy search problem
 Diffie W, Hellman M. New directions in cryptography [J]. IEEE Transactions on Information Theory, 1976: 644-654.
 Wang S B, Cao Z F, Le C. Efficient certificateless authenti-cated key agreement protocol from pairings [J]. Wuhan University Journal of Natural Sciences, 2006, 11(5): 1278-1282.
 Kim H J, Lee S M, Lee D H. Constant-round authenticated group key exchange for dynamic groups[C]//Advances in Cryptology-ASIACRYPT 2004. Berlin: Springer-Verlag, 2004: 245-259.
 Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols [J]. Selected Areas in Communications, IEEE Journal on, 2000, 18(4): 628-639.
 Lee H K, Lee H S, Lee Y R. An authenticated group key agreement protocol on braid groups [J]. IACR Cryptology ePrint Archive, 2003,(1): 1-9.
 Lu C F, Wu T C, Hsu C L. Certificateless authenticated group key agreement scheme with privacy-preservation for re-source-limited mobile devices [J]. International Journal of Inovative Computing Information and Control, 2012, 8(1): 599-615.
 Fathirad I, Devlin J. On constructing dynamic and forward secure authenticated group key agreement scheme from multikey encapsulation mechanism [J]. The Scientific World Journal, 2015,(6): 1-7.
 Black W S, Menezes A. Authenticated Diffie-Hellman key agreement protocols [C]// Proc of SAC’98. Berlin: Springer- Verlag, 1999, 1556: 339-361.
 Manezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography [M]. New York: CRC Press, 1997.
 Satyanarayana B, Prasad K S. Near Rings, Fuzzy Ideals, and Graph Theory [M]. London: Chapman and Hall CRC, 2013.