Abstract Identity-based secure group communications are relevant for distributed environments, whenever a group of peers needs to autonomously perform secure interactions in the context of an application, offered as a service by a trusted third party. A ground tool to enable secure group communications is authenticated group key agreement; indeed, once established a group secret key, integrity and confidentiality of group communications can be enforced thanks to symmetric cryptography. In this paper, we discuss the construction and implementation of identity-based signature schemes that make use of bilinear pairing to get shorter signatures, and their application to authenticated group key agreement. Besides the introduction of two new signature schemes, the aim of this contribution would be to show that through such schemes one can get implementations for identity-based secure group communications that scale sufficiently well with respect to the number of involved parties. We run a set of experiments that corroborate our expectations.

Identity-based secure group communications using pairings

Schmid G
2015

Abstract

Abstract Identity-based secure group communications are relevant for distributed environments, whenever a group of peers needs to autonomously perform secure interactions in the context of an application, offered as a service by a trusted third party. A ground tool to enable secure group communications is authenticated group key agreement; indeed, once established a group secret key, integrity and confidentiality of group communications can be enforced thanks to symmetric cryptography. In this paper, we discuss the construction and implementation of identity-based signature schemes that make use of bilinear pairing to get shorter signatures, and their application to authenticated group key agreement. Besides the introduction of two new signature schemes, the aim of this contribution would be to show that through such schemes one can get implementations for identity-based secure group communications that scale sufficiently well with respect to the number of involved parties. We run a set of experiments that corroborate our expectations.
2015
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Group key agreement
Identity-based cryptography
Pairing-based signatures
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/302109
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? ND
social impact