With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography-based authenticated group key exchange (ECC-AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography-based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
KEYWORDSauthentication, bilinear pairing, elliptic curve cryptography, group key exchange, secure communication to negotiate a common session key to secure their communication on a public network. The formal definition of key exchange protocol is given below: Definition 1.1. (Key negotiation technique): Suppose there are N-end users, namely, U 1 , U 2 … U N . These end users are willing to generate a common secret key K for securing the network communications among them. Each participating user {U i , i = 1, 2, … N} generates his key-related message, say {m i , i = 1, 2, … N} using some security parameter n and exchanges this message among themselves. Using these key-related messages m i , each Int J Commun Syst. 2017;30:e3363.wileyonlinelibrary.com/journal/dac