Next Article in Journal
A Combined Approach of Sensor Data Fusion and Multivariate Geostatistics for Delineation of Homogeneous Zones in an Agricultural Field
Next Article in Special Issue
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System
Previous Article in Journal
A Wideband Magnetoresistive Sensor for Monitoring Dynamic Fault Slip in Laboratory Fault Friction Experiments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

1
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, No.57, Sec. 2, Zhongshan Rd., Taiping District, Taichung 41170, Taiwan
2
Department of Medical Informatics, Tzu Chi University, No.701, Sec. 3, Zhongyang Rd., Hualien 97004, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(12), 2793; https://doi.org/10.3390/s17122793
Submission received: 30 October 2017 / Revised: 29 November 2017 / Accepted: 30 November 2017 / Published: 3 December 2017
(This article belongs to the Special Issue Selected Papers from IEEE ICICE 2017)

Abstract

:
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

1. Introduction

Communicating over the Internet is a convenient application as the development of the Internet becomes popular. People can communicate with each other via cloud meeting is a common application. A lot of companies deploy cloud meeting equipment to realize a remote discussion. Some special industries also take into account the cloud meeting, but they focus on the information security. For example, personalized information must be under controlled in medical conferences, and business confidentiality can not be tapped in cloud meeting.
The cloud meeting has following properties:
  • Known members: The meeting members are known before meeting. Therefore, the organizer has a participant list in advance.
  • Difficult preset: Even if the organizer has a participant list, generating the meeting setting, e.g., passwords or meeting tokens, in advance is inappropriate. Dynamically generating meeting setting is the optimal solution [1,2,3,4,5,6,7] for the security consideration.
  • Over the Internet: This is the core requirement for realizing a cloud meeting.
  • Multi-member communication: The communication within a pair of members is tractable. When the number of participants increases, to ensure that each member can identify each other is difficult.
For the fourth property, the cloud meeting can be classified into three categories, and they are one-to-one, one-to-many, and many-to-many models as shown in Figure 1. The most popular application is one-to-many model. For example, the user uses a password to log in to a web service. In this model, participants have a security communication based on a centralized server [8]. The many-to-many model is similar to the one-to-many model, but the many-to-many model is decentralized [9].
Both one-to-many and many-to-many models are popular in real world cloud meeting. For example, building a safety communication tunnel to avoid information loss is a possible solution [8]. As shown in case of Figure 1b, the server provides a safety communication tunnel for all connected members. The major advantage of the one-to-many model is the convenience. Although the many-to-many model does not suffer the attacks from hackers due to the decentralization, each member must have higher security equipment in the many-to-many model than in the one-to-many model. Therefore, we focus on the one-to-many model and propose a lightweight solution with security communication.
Before entities send messages with each other, they have to build up a secure communication. In the current secure communication technologies including Internet Protocol Security (IPSec) and https require a communication setup process with two steps: session key generation and message encryption/decryption. The goal of session key generation is to compute a session key for all communication members. Since the message that required by computing a session key is sent over the Internet, hiding the information applied to generate a session key is the major challenge. After all members have the same session key, they can use the session key to encrypt or decrypt messages in the second step. In this paper, we focus on the first step to design an efficient session key agreement scheme under the scenario drawn in case of Figure 1b.
Group authentication key agreement scheme is a possible solution in security cloud meeting. Each participant generates a session key to encrypt information, and it only can be used during this cloud meeting. Even if encrypted messages sent over the Internet are taken by man in the middle, they do not have enough information to get the original message. Diffie–Hellman key exchange is an appropriate technique to develop the group authentication key agreement scheme [8]. It guarantees high security for information exchange in a limited time period. A cloud meeting takes a few hours rather than several years, so Diffie–Hellman key exchange is secure for a cloud meeting.
However, Diffie–Hellman key exchange applies modular exponentiation to compute single-use session key, so it requires a lot of computation cost before the information exchange. In the cloud meeting, the schedules of many people may be rush, so they need an efficient solution for minimizing the setup time.
Another efficient key agreement protocol is extended chaotic map-based approaches [8,10]. These kind of schemes apply Chebyshev polynomials to provide the property, which is equivalent to the semigroup property of chaotic map [10,11,12,13,14]. The details are shown in Section 2 Preliminaries. Therefore, extended chaotic map-based approaches are efficient in computing session keys [15]. However, there is no group authentication key agreement scheme that applies the extended chaotic map in the one-to-many model [10].
There are some key agreement protocols that can be applied in case of Figure 1a. For example, Abdalla and Pointcheval provide a password-based approach for a pair of users [15]. Dutta and Barua extend the results of Abdalla and Pointcheval from one-to-one communication to the many-to-many model, and the shared password has been enhanced [16]. Kim et al. focus on the members join/leave a group without the assistance from a central server [3]. Boyd and Nieto address the efficiency of the key agreement protocol in terms of the number of rounds to generate a session key, and the proposed solution can be done in one round [17]. However, the solution still needs to be improved for the forward security issue.
For the group authentication, Lee et al. present a simple group password-based authenticated key agreement (SGPAKE) [8]. SGPAKE considers modular exponentiation, but the cost of generating session keys is not acceptable in cloud meeting. Therefore, we apply the extended chaotic map to propose the passwordless group authentication key agreement, termed by PL-GAKA. PL-GAKA is an extended chaotic map-based approach, so it improves the computation efficiency of SGPAKE. Since PL-GAKA is passwordless, meeting members do not need other password maintenance.
In our analysis, we first prove that each member can compute correct session key and they have security communication. Then, we refer to [8,18,19,20,21,22] to measure the security of PL-GAKA in terms of session key security, mutual authentication, perfect forward security, data integrity, and man-in-the-middle attack. Moreover, we also demonstrate that the proposed solution is safe when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks.
The structure of this paper is as follows: the background knowledge is present in Section 2. The proposed PL-GAKA is illustrated in Section 3. In Section 4, we analyze the correctness, security, and the overall comparison. The conclusion and future works are illustrated in Section 5.

2. Preliminaries

In this section, we will show that the security of Diffie–Hellman key exchange, and how the chaotic map-based approaches can reduce the computation cost without sacrificing the security of key agreement. In the following context, we first give an example to show the way of computing a session key over the Internet. Then, we introduce the Diffie-Hellman problem, which is the major property to guarantee the communication security. Eventually, we show an alternative technique named by the chaotic map to reduce the computation cost.
Diffie–Hellman key exchange is a famous scheme in terms of security communications. Considering the following scenario of generating a session key before starting a safety communication: Alice and Bob would like to create a security communication within G rounds. Firstly, Alice selects a big prime p and a primitive root g. Then, Alice generates a secrete value a for this communication with Bob:
Step 1
Alice obtains the message A = g a mod p and sends g , p , A to Bob over Internet.
Step 2
Bob also computes a secret value b for the communication with Alice. Bob computes the message B = g b mod p and sends B to Alice. Moreover, Bob uses g , p , A and b to compute the session key K = A b mod p = g a b mod p .
Step 3
Alice can compute the session key K = B a mod p = g b a mod p from B. Then, both Alice and Bob have the same session key and they can start to communicate with each other.
In Step 3, Alice and Bob get the session key K, and then they can communicate with each other via encrypting/decrypting messages by K.
During the steps above, Alice and Bob focus on computing K in an open environment. Only Alice and Bob can derive correct K even if eavesdroppers capture the messages sent from Alice or Bob. The core idea of the safety in terms of generating K is the Diffie–Hellman problem and that is shown in the following definition.
Definition 1.
Diffie–Hellman problem [23]: Given appropriate settings of G and g, eavesdroppers obtain g a b by solving the Diffie–Hellman problem.
Solving Difie-Hellman problem is hard [23,24], and this is the reason that Diffie–Hellman key exchange provides high security. However, Diffie–Hellman key exchange requires heavy computation cost due to the modular exponentiation consideration. Designing a key ageerment approach with lower computation cost is a research direction.
Since Alice computes K = B a mod p = g b a mod p and Bob computes K = A b mod p = g a b mod p , they derive the same K. Therefore, Alice and Bob can generate the session key via Internet. Chebyshev polynomials have similar properties as shown in the following definition.
Definition 2.
Semigroup property [25]: We have T r ( T s ( x ) ) = T r s ( x ) for different r and s, where 1 x 1 .
The core idea of semigroup is similar to g a b in the Diffie–Hellman problem. Semigroup implies that there is not a specific order for r and s. This property comes from Chebyshev polynomials, which is defined as T n + 1 ( x ) = 2 x T n ( x ) T n 1 ( x ) , where T 0 ( x ) = 1 , T 1 ( x ) = x , n Z + , and x R .
However, 1 x 1 is not enough provide high security in terms of the diversity of x, and Zhang extends the mapping range from [ 1 , 1 ] to ( , ) [10]. The Extended Chebyshev polynomials are shown in Definition 3. The security can be improved dramatically. In other words, the scheme with semigroup property has similar security to that of the Diffie–Hellman key exchange.
Definition 3.
Extended Chebyshev polynomials: Given x R , we have T r ( T s ( x ) ) mod p = T s r ( x ) mod p = T s ( T r ( x ) ) mod p for different r and s.
In other words, we can apply chaotic map functions to design a key agreement approach with lower computation costs than that required by Diffie–Hellman key exchange protocols. The chaotic map-based key agreement approaches have similar security to that of the Diffie–Hellman problem.

3. Proposed Solution

SGPAKE has three processes including registration, authentication, and password modification. PL-GAKA is a passwordless scheme, so password modification is not necessary. The processes of registration and authentication are illustrated in the following subsections. Moreover, the symbol system applied in this paper is shown in Table 1.

3.1. Registration

The purpose of registration is to construct a list of potential meeting members for GWN. Each meeting member U i provides the identity U I D i to GWN. GWN uses U I D i to generate the encrypted shared secret information K G S i , and then U i are available to join a cloud meeting.
The major consideration is the security, and we have the following issues. The first issue is how GWN confirms U i , and the second one is how to ensure the safety of the entire process. Since PL-GAKA is passwordless, U I D i is important information for verifying U i . The whole registration can be completed in an offline and face-to-face process, and the secure solution can be applied to determine the user characteristics, e.g., smart card [18]. We focus on providing the communication security during the cloud meeting, and meeting members can be pre-defined before meeting. Therefore, the offline registration process is available for cloud meeting to ensure each member is verified. The registration processes are illustrated in Figure 2, and details are listed as follows:
Step 1
The user U i registers his/her identity U I D i in GWN.
Step 2
GWN uses the private key k G to compute K G S i = h ( U I D i k G ) and then sends K G S i to U i via the secure channel.
Step 3
U i saves K G S i for further authentications.

3.2. Authentication

The communication security depends on the stable member. All members must know each other. When a member joins the meeting, the authentication process is launched to ensure that all members know each other including GWN.
The authentication process spreads four messages. In the beginning, each U i sends the encrypted identity message M 1 to GWN. GWN verifies M 1 and sends the message M 2 including the list of meeting members and the encrypted server information back. After receiving M 2 , U i broadcasts M 3 including the information required by cross authentication. Then, U i generates and broadcasts authentication information M 4 . Eventually, each member authenticates each other and computes the session key for the encryption in the following meeting. We consider the timestamp in each message to guarantee that the process sequence can be tracked. Thus, when receiving a message, verifying the timestamp is the first task.
Consider n registered members who would like to participate in a cloud meeting. The proposed authentication process is illustrated in Figure 3, and the details are shown as follows:
Step 1
Each user U i generates a random number a i and computes R i = T a i ( X ) mod p . After considering the timestamp T 1 , we have R i h ( K G S i T 1 ) . Then, the encrypted identity message M 1 = { U I D i , R i h ( K G S i T 1 ) , T 1 } is organized and sent to GWN.
Step 2
As receiving M 1 , GWN verifies T 1 firstly. GWN calculates h ( K G S i T 1 ) and obtains R i h ( K G S i T 1 ) by Exclusive-OR (XOR) operation. Then, R i is derived by ( R i h ( K G S i T 1 ) ) h ( K G S i T 1 ) . According to semigroup property from Definition 3, we have X i = T b i ( R i ) mod p = T a i b i ( X ) mod p and X i = T b i ( R i + 1 ) mod p = T a i + 1 b i ( X ) mod p . Then, we use Y i = X i 1 h ( K G S i R i T 2 0 ) and Y i = X i h ( K G S i R i T 2 1 ) to generate the authentication information A u t h G S i = h ( K G S i R i Y i Y i ) for verifying GWN. Eventually, the message M 2 = { S n , Y i , Y i , A u t h G S i , T 2 } , where S n = { U 1 , U 2 , , U n } , including meeting member list and GWN authentication information is sent to U i .
Step 3
Any other member U i , i j , receives M 2 and verifies T 2 and GWN by A u t h G S i . Next, X i 1 and X i are derived by Y i h ( K G S i R i T 2 0 ) and Y i h ( K G S i R i T 2 1 ) , respectively. Thus, we can compute V i = T a i ( X i 1 ) mod p = T a i 1 b i 1 a i ( X ) mod p , and V i 1 = T a i ( X i ) mod p = T a i + 1 b i a i ( X ) mod p . Then, the factor of the session key can be derived W i = V i / V i 1 = ( T a i 1 b i 1 a i ( X ) mod p ) / ( T a i + 1 b i a i ( X ) mod p ) . Finally, the message M 3 = { U I D i , W i , T 3 } is broadcasted to all users.
Step 4
U i verifies T 3 after receiving M 3 , and then derives the session key s k i by the following process:
s k i = ( V i ) n × ( W i + 1 ) n 1 × ( W i + 2 ) n 2 × × ( W i 1 ) = V 1 × V 2 × × V n .
The authentication information A u t h i 1 = h ( S n s k i U I D i T 3 ) applied by other members, and the authentication information A u t h i 2 = h ( K G S i S n V i T 3 ) applied by GWN can be derived. U i broadcasts authentication information M 4 = { A u t h i 1 , A u t h i 2 } to other users.
Step 5
After receiving M 4 , any other member U j , i j , can authenticate U i by A u t h i 1 , and GWN can authenticate U i by A u t h i 2 . Eventually, the session key of this meeting can be generated S K = h ( S n , s k i ) .
When each participant obtains S K , they can start to communicate with each other via encrypting/decrypting messages by S K .
In PL-GAKA, we apply a chaotic map to reduce the computation cost from SGPAKE. The process of key agreement can be finished early, and the meeting members can build a safety communication. For the security, each participant applies a semigroup property shown in Definition 3 to compute the factor of session key as shown in Step 2. The messages required by the process of key agreement can be sent via the Internet. In summary, the proposed PL-GAKA requires low computation cost but provides similar security level to the Diffie–Hellman problem in a convenient cloud meeting.

4. Performance Analysis

We analyze the proposed solution in terms of the correctness, the security and the overall comparison with related solutions. For the security verification, we refer to [8,18,19,20,21,22] to evaluate session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that the proposed solution is safe when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks.

4.1. Correctness

If each U i computes s k i correctly, it implies that all members have security communications in the cloud meeting. Therefore, we trace the process of generating s k i , and the resuls are correct:
s k i = ( T a i 1 b i 1 a i ( x ) mod p ) n × ( T a i b i a i + 1 ( x ) mod p T a i 1 b i 1 a i ( x ) mod p ) n 1 × ( T a i + 1 b i + 1 a i + 2 ( x ) mod p T a i b i a i + 1 ( x ) mod p ) n 2 × × ( T a i + n 1 b i + n 1 a i + n ( x ) mod p T a i + n 2 b i + n 2 a i + n 1 ( x ) mod p ) = ( T a i 1 b i 1 a i ( x ) mod p ) × ( T a i b i a i + 1 ( x ) mod p ) × ( T a i + 1 b i + 1 a i + 2 ( x ) mod p ) × × ( T a i + n 1 b i + n 1 a i + n ( x ) mod p ) = ( T a 1 b 1 a 2 ( x ) mod p ) × ( T a 2 b 2 a 3 ( x ) mod p ) × ( T a 3 b 3 a 4 ( x ) mod p ) × × ( T a n b n a n + 1 ( x ) mod p ) .

4.2. Security Analysis

4.2.1. Session Key Security

U i uses the session key to encrypt the information sending over Internet. Therefore, if the session key is secure, it means that the communication in the cloud meeting is also security. The proposed solution has the Diffie–Hellman problem. Even if attackers capture T a i ( x ) or T b i ( x ) , they still can not generate authentication information. Moreover, we consider random value a i and b i , so it is difficult for attackers to compute s k i and S K = h ( S n , s k i ) . Therefore, the session key is security in PL-GAKA.

4.2.2. Mutual Authentication

In the authentication process, the authentication information is used to verify members and GWN. In PL-GAKA, each member uses A u t h G S i and A u t h i 1 to verify GWN and other members while GWN uses A u t h i 2 to verify participants. Even if attackers can capture the identity and K G S i , respectively, and then generate A u t h G S i and M 4 , each member must be authenticated by all other members and GWN. Therefore, the PL-GAKA is secure under the multi-authentication consideration.

4.2.3. Perfect Forward Security

Considering a situation in which attackers have the ability to capture the session key, they can use the session key to decrypt the information sending during cloud meetings. For example, a web user uses a username and a password to log in to a web service. If someone knows the username and the password, he/she can log in to the same web service and use it.
PL-GAKA does not take username and password into account for each meeting member. In each meeting, we use s k i = ( V i ) n × ( W i + 1 ) n 1 × ( W i + 2 ) n 2 × × ( W n 1 ) to compute the session key S K = h ( S n , s k i ) . In other words, even if the session key is captured by attackers, the cloud meeting is still secure during the cloud meeting.

4.2.4. Data Integrity

When the information is modified by attackers, we say that the protocol has data integrity if each member can recognize the correctness of the received data. In PL-GAKA, if R i h ( K G S i T 1 ) in M 1 is tampered with, GWN can use h ( K G S i T 1 ) to capture R i . If W i in M 3 is tampered with, other members will derive an unmatched s k i . Therefore, the proposed protocol satisfies data integrity.

4.2.5. Replay Attack

Attackers can eavesdrop on the packets sending over Internet to capture the communication information. Then, attackers send the captured information again to be an authenticated user. This is the replay attack. If the mechanism can not detect replay attack, someone can counterfeit an authentication member.
In the proposed solution, we consider the timestamp for each message. If attackers counterfeit an authentication member and resend the message again, the timestamp can be used to capture the irrationality. Thus, the replay attack is useless in PL-GAKA.

4.2.6. Impersonation Attack

Impersonation attack means that illegal users impersonate legal ones and pass the authentication process with the stolen authenticated message to enter the system.
In the proposed group authenticated key agreement mechanism, the attacker can not obtain the authenticated message of K G S i because K G S i is encrypted. Without K G S i , the attacker can not impersonate U i or GWN. Therefore, PL-GAKA can defend impersonation attacks.

4.2.7. Privileged-Insider Attack

Privileged-insider attack means that an authentication member impersonates other legal users with his/her own authenticated message. U i in PL-GAKA gets K G S i from GWN in a safety tunnel in the registration process. Since different members will have various K G S i , no member can use his/her own K G S i to impersonate the other one. Hence, this mechanism can defend privileged-insider attack.

4.2.8. Stolen-Verifier Attack

Some protocol considers static verification data, which is saved in the server for authenticating members. Attackers steal the verification data from authentication servers, so that the attackers are authenticated by the verification data. Each member in the proposed solution is verified by other members and GWN, so verification data is not necessary. Therefore, the stolen-verifier attack is useless for the PL-GAKA.

4.2.9. Shared Device

Sharing a communication device, e.g., cell phone or tablet, is a common behavior between friends. In our scenario, if the encryption and decryption protocols are implemented in the specific communication device, the sharing device may be a security issue. PL-GAKA requires users to provide the identity as shown in several processes, such as generating M 1 and M 3 . If a sharing device is used in PL-GAKA, the impersonator still can not join the cloud meeting due to the lack of identity. Therefore, sharing a device does not work in PL-GAKA.

4.2.10. Man-in-the-Middle Attack

During the key generation process, man-in-the-middle attack means that there is an attacker who builds a pair of connections with a specific sender and receiver. In other words, all messages sent from sender to receiver will be relayed by the attacker, and the attacker can access all the information of sender and receiver.
Man-in-the-middle attack is useless in the PL-GAKA, and we have the following properties to prove this claim. First, each member uses his/her unique U I D i in the registration and authentication processes. Thus, generating U I D i is an essential requirement. Second, each member must register in the GWN by the U I D i . The attacker has to be verified by GWN. Third, S n is considered in Step 2 of authentication process. In other words, each meeting member must be verified by each other. Putting the above together, PL-GAKA avoids a man-in-the-middle attack.

4.3. Security Analysis via BAN Logic

We apply Burrows-Abadi-Needham (BAN) logic to verify the security of PL-GAKA in a formal analysis. PL-GAKA consists of registration and authentication phrases. Since registration phrase can be processed in a safety tunnel, we focus on the analysis in terms of the authentication phrase.
PL-GAKA is a group key authentication scheme, and some cloud meeting members will exchange messages between each member and GWN. To simplify the communication model, we generalize a meeting communication to the model with GWN and two members u i and u j . There are some concurrent processes in the authentication of PL-GAKA. For example, each member sends the identity message to GWN that all members send M 1 to GWN, and we consider a simple case that u i and u j send M 1 to GWN simultaneously. Moreover, M 3 and M 4 will be broadcasted to all members, and we consider the case that u i sends M 3 to u j while u j sends M 4 to u i . Therefore, we can generalize the communication model to a simple one, as shown in Figure 4.
After registering in GWN, each u i has the initial state including U I D i , K G S i , and a timestamp generator. According to Figure 4, we have the following processes. Note that both u i and u j sends M 1 to GWN while GWN responses M 2 to u i and u j , and we just focus on the notation on the communication between u i and GWN.
P1 s a i d ( u i , M 1 ) : u i sends M 1 .
P2 s e e s ( G W N , M 1 ) : GWN receives M 1 .
P3 s a i d ( G W N , M 2 ) : GWN sends M 2 .
P4 s e e s ( u i , M 2 ) : u i receives M 2 .
P5 s a i d ( u i , M 3 ) : u i sends M 3 .
P6 s e e s ( u j , M 3 ) : u j receives M 3 .
P7 s a i d ( u j , M 4 ) : u j sends M 4 .
P8 s e e s ( u i , M 4 ) : u i receives M 4 .
Here, we have the following assumptions:
A1 b e l ( G W N , c o n t ( u i , M 1 ) ) : GWN believes that he/she has the ability to confirm M 1 sent from u i .
A2 b e l ( G W N , g o o d i n f o ( u i , M 1 , G W N ) ) : GWN believes that M 1 sent from u i to GWN is confirmed.
A3 b e l ( u i , c o n t ( G W N , M 2 ) ) : u i believes that he/she has the ability to confirm M 2 sent from GWN.
A4 b e l ( u i , g o o d i n f o ( G W N , M 2 , u i ) ) : u i believes that M 2 sent from GWN to u i is confirmed.
A5 b e l ( u j , c o n t ( u i , M 3 ) ) : u j believes that he/she has the ability to confirm M 3 sent from u i .
A6 b e l ( u j , g o o d i n f o ( u i , M 3 , u j ) ) : u j believes that M 3 sent from u i to u j is confirmed.
A7 b e l ( u i , c o n t ( u j , M 4 ) ) : u i believes that he/she has the ability to confirm M 4 sent from u j .
A8 b e l ( u i , g o o d i n f o ( u j , M 4 , u i ) ) : u i believes that M 4 sent from u j to u i is confirmed.
A9 b e l ( G W N , f r e s h ( T 1 ) ) : GWN believes that T 1 is fresh.
A10 b e l ( u i , f r e s h ( T 2 ) ) : u i believes that T 2 is fresh.
A11 b e l ( u j , f r e s h ( T 3 ) ) : u j believes that T 3 is fresh.
Thus, we have the following goals:
G1 b e l ( U I D i , R i h ( K G S i T 1 ) , f r e s h ( T 1 ) ) . G W N u i : M 1 sent from u i to GWN is correct and fresh.
G2 b e l ( S n , Y i , Y i , A u t h G S i , f r e s h ( T 2 ) ) . u i G W N : M 2 sent from GWN to u i is correct and fresh.
G3 b e l ( U I D i , W i , f r e s h ( T 3 ) ) . u j u i : M 3 sent from u i to u j is correct and fresh.
G4 b e l ( A u t h i 1 , A u t h i 2 ) . u i u j : M 4 sent from u j to u i is correct and fresh.
From the believe connection, each goal can be achieved:
G1:From P 1 , P 2 , A 1 , A 2 , and A 9 , M 1 is correct and fresh.
G2:From P 3 , P 4 , A 3 , A 4 , and A 10 , M 2 is correct and fresh.
G3:From P 5 , P 6 , A 5 , A 6 , and A 11 , M 3 is correct and fresh.
G4:From P 7 , P 8 , A 7 , and A 8 , M 4 is correct and fresh.
Since each goal can be achieved, PL-GAKA provides a secure session key generation.

4.4. Security Comparison

The overall comparison between PL-GAKA and related approaches are shown in Table 2. We refer to [8] for considering the following protocols:
  • Protocol #1 proposed by Abdalla and Pointcheval is a group password-based key agreement [15].
  • Protocol #2 proposed by Dutta and Barua is a group password-based authentication key agreement [16].
  • Protocol #3 proposed by Kim et al. is a group key agreement [3].
  • Protocol #4 proposed by Boyd and Nieto is a group key agreement [17].
  • Protocol #5 proposed by Lee et al. is a group password-based authentication key agreement [8].
For the security consideration, PL-GAKA takes into account the extended chaotic map to improve the computation efficiency from SGPAKE. Although the extended chaotic map does not provide the Diffie–Hellman problem, we still can derive an equivalent security level by extended Chebyshev polynomials. Therefore, solving the message generated by the extended chaotic map requires similar computing resource to that in the Diffie–Hellman problem. Therefore, the security level gap between PL-GAKA and SGPAKE is small.

4.5. Efficiency Comparison

The results of the efficiency comparison between SGPAKE and PL-GAKA are illustrated in Table 3. Since this paper focuses on the cloud meeting and improves SGPAKE in the cloud meeting, we compare PL-GAKA with SGPAKE. For the Exponentiation evaluation, SGPAKE requires 4 ( 2 a ) because of two modular exponential computations for generating session keys. According to the properties of cloud meetings, the participant list can be determined before PL-GAKA starts, so the heavy work can be well prepared, and the computation cost can be finished from an offline computation.
For the efficiency of the session key calculation process, PL-GAKA considers the extended chaotic map, which is a lightweight calculation compared with the modular exponential computation. Thus, PL-GAKA requires less computation time to generate a session key than that of SGPAKE. On the other hand, the meeting member does not require a password to verify the identity in PL-GAKA, so the password maintenance mechanism is not necessary in Pl-GAKA, but it is required in SGPAKE. Putting the above together, PL-GAKA is more efficient than SGPAKE in terms of key generation and the user maintenance.

5. Conclusions

Group authentication key agreement is necessary for providing security communications, and a cloud meeting is a typical and popular application. Lee et al. present SGPAKE to realize the secure group communication. However, SGPAKE is a Diffie–Hellman key exchange scheme, and the heavy computation cost is an implementation issue. We consider SGPAKE and apply the extended chaotic map to propose a password-less group authentication key agreement named PL-GAKA. Since an extended chaotic map provides properties that are similar to semigroup in chaotic map, the security of PL-GAKA is equivalent to that of SGPAKE. PL-GAKA is a password-less protocol, so each user does not worry about the password maintenance. Moreover, the session key is dynamic in each cloud meeting. In other words, PL-GAKA considers short-term authentication, and it provides stronger security than other long-term authentication protocols. In the future, we will focus on the progress on improving the registration security of the meeting members coming from various companies, and consider sharing devices.
When a cloud meeting takes place, only the registered users can be invited to join the meeting. In the real world applications, the registration can be finished when a new staff member is reported to the company, and the entire process can be done in a secure procedure. It means that the meeting members must be employed in the same company in PL-GAKA. In other words, the registration process must be improved for staff members from different companies that do not have consistent registration processes.

Acknowledgments

The authors would like to thank to reviewers for their valuable suggestions to improve the manuscript.

Author Contributions

Tsung-Hung Lin, Tian-Fu Lee and Zeng-Bo Wang analyze the requirements and design the mechanism; Chen-Kun Tsung and Tsung-Hung Lin analyze the proposed mechanism; Chen-Kun Tsung and Tsung-Hung Lin revises the paper and reports the suggestion reply.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
GWNTrust Authentication Server
SGPAKESimple Group Password-based Authenticated Key Agreement
PKIPublic Key Infrastructure
PL-GAKAPasswordless Group Authentication Key Agreement

References

  1. Feng, Y.; Li, B.; Li, B. Airlift: Video Conferencing as a Cloud Service Using Inter-Datacenter Networks. In Proceedings of the IEEE International Conference on Network Protocols, Austin, TX, USA, 30 October–2 November 2012; pp. 1–11. [Google Scholar]
  2. Glitho, R.H. Cloud-based Multimedia Conferencing: Business Model, Research Agenda, State-of-the-Art. In Proceedings of the IEEE 13th Conference on Commerce and Enterprise Computing, Luxembourg, 5–7 September 2011; pp. 226–230. [Google Scholar]
  3. Kim, H.J.; Lee, S.M.; Lee, D.H. Constant-Round Authenticated Group Key Exchange for Dynamic Groups. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, 5–9 December 2004; pp. 245–259. [Google Scholar]
  4. Li, J.; Guo, R.; Zhang, X. Study on Service-Oriented Cloud Conferencing. In Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 6, pp. 21–25. [Google Scholar]
  5. Lee, T.-F.; Hwang, T. Improvement of the Round-Optimal Conference Key Agreement Protocol of Boyd and Nieto. In Proceedings of the 16th Information Security Conference, Taipei, Taiwan, 8 June 2006; pp. 98–102. [Google Scholar]
  6. Lee, T.-F.; Wen, H.-A.; Hwang, T. A weil Pairing-based Roundefficient and Fault-tolerant Group Key Agreement Protocol for Sensor Networks. In Sensor Network Operations; IEEE Press: Piscataway, NJ, USA, 2006; pp. 571–579. [Google Scholar]
  7. Lee, T.-F.; Wen, H.-A.; Jin, Y.-C.; Chen, C.-S. Password-based Group Key Agreement with Server’s Public Key for Hypergraphs. In Proceedings of the Symposium on Applications of Information, Management and Communication Technology, Kaohsiung, Taiwan, 13 June 2008. [Google Scholar]
  8. Lee, T.F.; Chang, I.P.; Wang, C.C. Simple Group Password-based Authenticated Key Agreements for the Integrated EPR Information System. J. Med. Syst. 2013, 37, 1–6. [Google Scholar] [CrossRef] [PubMed]
  9. Zhu, H.F. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving. Int. J. Netw. Secur. 2016, 18, 1001–1009. [Google Scholar]
  10. Zhang, L. Cryptanalysis of the Public Key Encryption based on Multiple Chaotic Systems. Chaos Solitons Fractals 2008, 37, 669–674. [Google Scholar] [CrossRef]
  11. Guo, C.; Chang, C.C. Chaotic Maps-based Password-Authenticated Key Agreement using Smart Cards. Commun. Nonlinear Sci. Numer. Simul. 2013, 18, 1433–1440. [Google Scholar] [CrossRef]
  12. Mishkovski, I.; Kocarev, L. Chaos-Based Cryptography: Theory, Algorithms and Applications; Springer: Berlin, Germany, 2011; pp. 53–54. [Google Scholar]
  13. Zhu, H.F.; Zhu, D.; Zhang, Y. Using Chaotic Maps to Construct Anonymous Multi-Receiver Scheme Based on BAN Logic. J. Inf. Hiding Multimed. Signal Process. 2016, 7, 685–696. [Google Scholar]
  14. Zhu, H.F.; Zhang, Y.; Xia, Y.; Li, H. Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model. Int. J. Netw. Secur. 2016, 18, 326–334. [Google Scholar]
  15. Abdalla, M.; Pointcheval, D. Simple Password-based Authenticated Key Protocols. In Topics in Cryptology - CT-RSA 2005. LNCS; Springer: Berlin, Germany, 2005; Volume 3376, pp. 191–208. [Google Scholar]
  16. Dutta, R.; Barua, R. Password-based Encrypted Group Key Agreement. Int. J. Inf. Secur. 2006, 3, 23–34. [Google Scholar]
  17. Boyd, C.; Nieto, J.M.G. Round-Optimal Contributory Conference Key Agreement. In Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2003; Volume 3, pp. 161–174. [Google Scholar]
  18. Zhang, L.; Tang, S.; Cai, Z. Efficient and Flexible Password Authenticated Key Agreement for Voice over Internet Protocol Session Initiation Protocol using Smart Card. Int. J. Commun. Syst. 2014, 27, 2691–2702. [Google Scholar] [CrossRef]
  19. Cheng, Z.Y.; Liu, Y.; Chang, C.C.; Chang, S.C. A Practical Secure Chaos-Based Group Key Agreement Protocol Suitable for Distributed Network Environment. Int. J. Innov. Comput. Inf. Control 2013, 9, 1935–1949. [Google Scholar]
  20. Bresson, E.; Chevassut, O.; Pointcheval, D. Provably Authenticated Group Diffie–Hellman Key Exchange—The Dynamic Case. Adv. Cryptol. ASIACRYPT 2001, 2248, 290–309. [Google Scholar]
  21. Bresson, E.; Chevassut, O.; Pointcheval, D. Group Diffie–Hellman Key Exchange Secure Against Dictionary Attacks. Adv. Cryptol. ASIACRYPT 2002, 603–610. [Google Scholar] [CrossRef]
  22. Bresson, E.; Chevassut, O.; Pointcheval, D. Dynamic Group Diffie–Hellman Key Exchange under Standard Assumptions. Adv. Cryptol. EUROCRYPT 2002, 321–336. [Google Scholar] [CrossRef]
  23. Boneh, D. The Decision Diffie–Hellman Problem. In Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA, 21–25 June 1998; pp. 48–63. [Google Scholar]
  24. Barbulescu, R.; Gaudry, P.; Joux, A.; Thomé, E. A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; pp. 1–16. [Google Scholar]
  25. Wang, X.; Zhao, J. An Improved Key Agreement Protocol based on Chaos. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 4052–4057. [Google Scholar] [CrossRef]
Figure 1. Three types of cloud meeting.
Figure 1. Three types of cloud meeting.
Sensors 17 02793 g001
Figure 2. The registration process.
Figure 2. The registration process.
Sensors 17 02793 g002
Figure 3. The authentication process.
Figure 3. The authentication process.
Sensors 17 02793 g003
Figure 4. The message delivery structure in the authentication process of PL-GAKA.
Figure 4. The message delivery structure in the authentication process of PL-GAKA.
Sensors 17 02793 g004
Table 1. The symbol system applied by the proposed solution.
Table 1. The symbol system applied by the proposed solution.
SymbolDefinition
U i i-th user
GWNThe trusty authentication server
h ( . ) One-way hash function
K G The private key generated by GWN
U I D i The id of U i
pA large prime number
T r Chaotic map
TThe timestamp
xA variable within ( , )
K G S i The identity of GWN for U i
A u t h G S i The authentication information applied by U i for verifying GWN
A u t h i 1 The authentication information applied by U j , j i , for verifying U i
A u t h i 2 The authentication information applied by GWN for verifying U i
s k i The factor of generating session key for U i
S n The list of participants
S K The session key
Table 2. The overall comparison between the proposed solution and related approaches.
Table 2. The overall comparison between the proposed solution and related approaches.
ProtocolProtocol #1Protocol #2Protocol #3Protocol #4Protocol #5PL-GAKA
Public KeyNoNoYesYesNoNo
Private Keyshared passwordshared passwordPKI-basedPKI-basedYesNo
Asymmetric EncryptionNoNoNoYesNoNo
Symmetric EncryptionYesYesNoNoYesNo
Signature VerificationNoNoYesYesNoNo
Mutual AuthenticationNoYesNoNoYesYes
Perfect Forward SecurityYesNoYesNoYesYes
PKI: Public Key Infrastructure.
Table 3. The efficiency comparison between SGPAKE and PL-GAKA.
Table 3. The efficiency comparison between SGPAKE and PL-GAKA.
ProtocolSGPAKEPL-GAKA
Password MaintenanceYesNo
ExponentiationYesNo
Key CalculationModular ExponentiationExtented Choatic Map

Share and Cite

MDPI and ACS Style

Lin, T.-H.; Tsung, C.-K.; Lee, T.-F.; Wang, Z.-B. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting. Sensors 2017, 17, 2793. https://doi.org/10.3390/s17122793

AMA Style

Lin T-H, Tsung C-K, Lee T-F, Wang Z-B. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting. Sensors. 2017; 17(12):2793. https://doi.org/10.3390/s17122793

Chicago/Turabian Style

Lin, Tsung-Hung, Chen-Kun Tsung, Tian-Fu Lee, and Zeng-Bo Wang. 2017. "A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting" Sensors 17, no. 12: 2793. https://doi.org/10.3390/s17122793

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop