• Dec 20, 2018 News!JACN Vol.6, No.2 has been published with online version.   [Click]
  • Sep 17, 2018 News!Welcome to 2019 4th International Conference on Information and Network Technologies (ICINT 2019), which will be held in Kyoto, Japan during May 25-27, 2019.   [Click]
  • Jul 04, 2018 News!JACN Vol.6, No.1 has been published with online version.   [Click]
General Information
    • ISSN: 1793-8244
    • Abbreviated Title:  J. Adv. Comput. Netw.
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Dr. Ka Wai Gary Wong
    • Executive Editor: Ms. Nina Lee
    • Abstracting/ Indexing: EI (INSPEC, IET),  Electronic Journals Library, Ulrich's Periodicals Directory, EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Dr. Ka Wai Gary Wong
Division of Information and Technology Studies, Faculty of Education, The University of Hong Kong.
It's a honor to serve as the editor-in-chief of JACN. I'll work together with the editors and reviewers to help the journal progress
JACN 2018 Vol.6(1): 1-6 ISSN: 1793-8244
DOI: 10.18178/JACN.2018.6.1.245

An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps

Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen, and Cheng-Chi Lee
Abstract—The decentralized group key agreement scheme allows a group of participants to exchange private multicast messages via the protection of a group session key in the group. Recently, Zhu proposed the first group authentication key agreement scheme based on chaotic maps and the structure of a group is organized in an ordered chain. Thus each participant needs to establish two temporary two-party session keys with its predecessor and successor in a parallel algorithm. In order to cope with dynamic groups, the group session keys are frequently updated whenever a new member joins or a member leaves the group. Zhu claimed that the proposed scheme is secure against various attacks such as replay, man-in-the-middle, impersonation and key compromise attacks. Furthermore, Zhu extended the proposed scheme to high level security attributes such as privacy preserving, no clock synchronization problem, mutual and group authentication and perfect forward secrecy etc. However, in this paper, we found that Zhu’s scheme is vulnerable to successor impersonation problem and this weakness leads to a malicious adversary from deriving group session keys after impersonate attack. Moreover, their scheme is vulnerable to known key attack and this problem may lead to an adversary to compromise the previous and future group session keys. To overcome these security flaws, in this paper, we significantly improve the security of Zhu’s group key agreement scheme without increasing the communication overhead and computation complexity.

Index Terms—Cryptanalysis, chaotic maps, group key management, impersonation attack, privacy preserving.

Chun-Ta Li is with the Department of Information Management, Tainan University of Technology, Tainan City 71002, Taiwan, R.O.C. (e-mail: th0040@mail.tut.edu.tw). Chi-Yao Weng is with the Department of Computer Science, Pingtung City 90003, Taiwan, R.O.C. (e-mail: cyweng@mail.nptu.edu.tw). Chien-Ming Chen is with the School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, P.R. China (e-mail: chienming.taiwan@gmail.com). Cheng-Chi Lee is with the Department of Library and Information Science, Fu Jen Catholic University, New Taipei City 24205, Taiwan, R.O.C. and with the Department of Photonics and Communication Engineering, Asia University, Taichung City 41354, Taiwan, R.O.C. (e-mail: cclee@mail.fju.edu.tw).


Cite:Chun-Ta Li, Chi-Yao Weng, Chien-Ming Chen, and Cheng-Chi Lee, "An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps," Journal of Advances in Computer Networks vol. 6, no. 1, pp. 1-6, 2018.

Copyright © 2008-2018. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net