Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography

被引:4
|
作者
Jaiswal, Priyanka [1 ]
Kumar, Abhimanyu [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Group diffie hellman; Elliptic curve cryptography (ECC); Queue based group key agreement; THRESHOLDING TECHNIQUES; MULTILEVEL; SEGMENTATION; PERFORMANCE;
D O I
10.1007/978-81-322-2250-7_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure group communication is an important research issue in the field of cryptography and network security, because group applications like online chatting programs, video conferencing, distributed database, online games etc. are expanding rapidly. Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. The design of secure group communication can be very critical for achieving security goals. Many group key agreement protocols such as Tree-based Group Diffie-Hellman (TGDH) Kim et al. (ACM Trans Inf SystSecur (TISSEC) 7(1): 60-96, (2004)) [1], Group Diffie-Hellman (GDH) Steiner et al. (IEEE TransParallel Distrib Syst 11(8): 769-780, (2000)) [2], Skinny Tree (STR) Wong et al. (IEEE/ACMTrans Netw 8(1): 16-30, (2000)) [3] etc., have been established for secure group communication, but they have suffered from unnecessary delays as well as their communication cost increased due to increased exponentiation. An alternative approach to group key agreement is the queue based group key agreement protocol that reduces unnecessary delays, considers member diversity with filtering out low performance members in group key generation processes. We propose a novel queue based group key agreement protocol that uses the concepts of elliptic curve cryptography. The proposed protocol gives better results than the other existing related protocols and it also reduces computational overheads.
引用
收藏
页码:167 / 186
页数:20
相关论文
共 50 条
  • [31] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Huang, Baojun
    Khan, Muhammad Khurram
    Wu, Libing
    Bin Muhaya, Fahad T.
    He, Debiao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 225 - 240
  • [32] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Baojun Huang
    Muhammad Khurram Khan
    Libing Wu
    Fahad T. Bin Muhaya
    Debiao He
    Wireless Personal Communications, 2015, 85 : 225 - 240
  • [33] LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids
    Taqi, Susan A. Mohammed
    Jalili, Saeed
    ENERGY REPORTS, 2022, 8 : 153 - 164
  • [34] An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
    Qiu, Shuming
    Xu, Guosheng
    Ahmad, Haseeb
    Xu, Guoai
    Qiu, Xinping
    Xu, Hong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 978 - 1002
  • [35] An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Odelu, Vanga
    Yoo, Kee-Young
    PLOS ONE, 2016, 11 (05):
  • [36] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    Journal of Electronics, 2005, (03) : 268 - 272
  • [37] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [38] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    Journal of Electronics(China), 2005, (03) : 268 - 272
  • [39] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Qi, Mingping
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 23335 - 23351
  • [40] New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
    Mingping Qi
    Jianhua Chen
    Multimedia Tools and Applications, 2018, 77 : 23335 - 23351