Pengshuai Qiao
North China University of Water Conservancy & Electric Power

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Perfect Forward Secure ID-based Key Agreement Protocol in Group Communication Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7471-7477

Abstract

Several identity-based key agreement protocols using bilinear pairing have been proposed in recent years and none of them has achieved all required security properties. In this paper, we firstly propose an ID-based one round authenticated group key agreement protocol with bilinear pairings, where all participants can generate the group session key in one round. Based on the intractability of elliptic curve discrete logarithm problem, every user’s private key can be proved to be secure. Also an extended version of one round authenticated group key agreement protocol is given, it provide perfect forward secrecy and avoid key escrow by the Key Generation Center.  Finally, a comprehensive security analysis and a comprehensive security analysis are provided. By comparing with other protocols, the proposed protocol requires lower computation cost.
On the Security of a Dynamic and Secure Key Management Model for Hierarchical Heterogeneous Sensor Networks Pengshuai Qiao
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i10.pp7459-7462

Abstract

With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the crucial important building block for all security goals in WSNs. Recently, Alagheband and Aref proposed a signcryption scheme and used it to construct a dynamic key management model for hierarchical heterogeneous sensor networks. They also proved that their signcryption scheme is provably secure if the elliptic curve discrete logarithm problem is infeasible. Unfortunately, by giving concrete attacks, we indicate that Alagheband and Aref’s signcryption scheme is not secure in their secure model. The analysis also shows that their key management model is not secure. To solve those weaknesses, we also proposed an improved signcryption scheme.