Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography

被引:4
|
作者
Jaiswal, Priyanka [1 ]
Kumar, Abhimanyu [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Group diffie hellman; Elliptic curve cryptography (ECC); Queue based group key agreement; THRESHOLDING TECHNIQUES; MULTILEVEL; SEGMENTATION; PERFORMANCE;
D O I
10.1007/978-81-322-2250-7_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure group communication is an important research issue in the field of cryptography and network security, because group applications like online chatting programs, video conferencing, distributed database, online games etc. are expanding rapidly. Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. The design of secure group communication can be very critical for achieving security goals. Many group key agreement protocols such as Tree-based Group Diffie-Hellman (TGDH) Kim et al. (ACM Trans Inf SystSecur (TISSEC) 7(1): 60-96, (2004)) [1], Group Diffie-Hellman (GDH) Steiner et al. (IEEE TransParallel Distrib Syst 11(8): 769-780, (2000)) [2], Skinny Tree (STR) Wong et al. (IEEE/ACMTrans Netw 8(1): 16-30, (2000)) [3] etc., have been established for secure group communication, but they have suffered from unnecessary delays as well as their communication cost increased due to increased exponentiation. An alternative approach to group key agreement is the queue based group key agreement protocol that reduces unnecessary delays, considers member diversity with filtering out low performance members in group key generation processes. We propose a novel queue based group key agreement protocol that uses the concepts of elliptic curve cryptography. The proposed protocol gives better results than the other existing related protocols and it also reduces computational overheads.
引用
收藏
页码:167 / 186
页数:20
相关论文
共 50 条
  • [21] Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography”
    Saru Kumari
    Multimedia Tools and Applications, 2017, 76 : 13581 - 13583
  • [22] Design flaws of "an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography"
    Kumari, Saru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13581 - 13583
  • [23] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [24] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [25] A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography
    Vivek Kumar
    Sangram Ray
    Mou Dasgupta
    Muhammad Khurram Khan
    Wireless Personal Communications, 2021, 118 : 3045 - 3061
  • [26] A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography
    Kumar, Vivek
    Ray, Sangram
    Dasgupta, Mou
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 3045 - 3061
  • [27] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815
  • [28] An elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 767 - 777
  • [29] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [30] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Multimedia Tools and Applications, 2017, 76 : 1801 - 1815