Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography

被引:4
|
作者
Jaiswal, Priyanka [1 ]
Kumar, Abhimanyu [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Group diffie hellman; Elliptic curve cryptography (ECC); Queue based group key agreement; THRESHOLDING TECHNIQUES; MULTILEVEL; SEGMENTATION; PERFORMANCE;
D O I
10.1007/978-81-322-2250-7_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure group communication is an important research issue in the field of cryptography and network security, because group applications like online chatting programs, video conferencing, distributed database, online games etc. are expanding rapidly. Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. The design of secure group communication can be very critical for achieving security goals. Many group key agreement protocols such as Tree-based Group Diffie-Hellman (TGDH) Kim et al. (ACM Trans Inf SystSecur (TISSEC) 7(1): 60-96, (2004)) [1], Group Diffie-Hellman (GDH) Steiner et al. (IEEE TransParallel Distrib Syst 11(8): 769-780, (2000)) [2], Skinny Tree (STR) Wong et al. (IEEE/ACMTrans Netw 8(1): 16-30, (2000)) [3] etc., have been established for secure group communication, but they have suffered from unnecessary delays as well as their communication cost increased due to increased exponentiation. An alternative approach to group key agreement is the queue based group key agreement protocol that reduces unnecessary delays, considers member diversity with filtering out low performance members in group key generation processes. We propose a novel queue based group key agreement protocol that uses the concepts of elliptic curve cryptography. The proposed protocol gives better results than the other existing related protocols and it also reduces computational overheads.
引用
收藏
页码:167 / 186
页数:20
相关论文
共 50 条
  • [1] Queue-based group key agreement protocol
    Office of International Affairs, Texas Tech University, 601 Indiana, Lubbock, TX, United States
    Int. J. Netw. Secur., 2009, 2 (135-142):
  • [2] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [3] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [4] Efficient Region -Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography
    Kumar, K.
    Sumathy, V.
    Begum, J. Nafeesa
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1052 - +
  • [5] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [6] An authenticated group key transfer protocol using elliptic curve cryptography
    Jaiswal, Priyanka
    Tripathi, Sachin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 857 - 864
  • [7] An authenticated group key transfer protocol using elliptic curve cryptography
    Priyanka Jaiswal
    Sachin Tripathi
    Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
  • [8] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032
  • [9] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2023, 82 : 16009 - 16032
  • [10] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
    Usha, S.
    Kuppuswami, S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158