Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography

被引:4
|
作者
Jaiswal, Priyanka [1 ]
Kumar, Abhimanyu [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Group diffie hellman; Elliptic curve cryptography (ECC); Queue based group key agreement; THRESHOLDING TECHNIQUES; MULTILEVEL; SEGMENTATION; PERFORMANCE;
D O I
10.1007/978-81-322-2250-7_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure group communication is an important research issue in the field of cryptography and network security, because group applications like online chatting programs, video conferencing, distributed database, online games etc. are expanding rapidly. Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. The design of secure group communication can be very critical for achieving security goals. Many group key agreement protocols such as Tree-based Group Diffie-Hellman (TGDH) Kim et al. (ACM Trans Inf SystSecur (TISSEC) 7(1): 60-96, (2004)) [1], Group Diffie-Hellman (GDH) Steiner et al. (IEEE TransParallel Distrib Syst 11(8): 769-780, (2000)) [2], Skinny Tree (STR) Wong et al. (IEEE/ACMTrans Netw 8(1): 16-30, (2000)) [3] etc., have been established for secure group communication, but they have suffered from unnecessary delays as well as their communication cost increased due to increased exponentiation. An alternative approach to group key agreement is the queue based group key agreement protocol that reduces unnecessary delays, considers member diversity with filtering out low performance members in group key generation processes. We propose a novel queue based group key agreement protocol that uses the concepts of elliptic curve cryptography. The proposed protocol gives better results than the other existing related protocols and it also reduces computational overheads.
引用
收藏
页码:167 / 186
页数:20
相关论文
共 50 条
  • [41] Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)
    Hong, Sunghyuck
    Lee, Sungjin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01): : 149 - 165
  • [42] Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)
    Hong, Sunghyuck
    Lee, Sungjin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (07): : 1737 - 1753
  • [43] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    Kavitha, S.
    Alphonse, P. J. A.
    Reddy, Y. Venkataramana
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (08)
  • [44] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    S. Kavitha
    P. J. A. Alphonse
    Y. Venkataramana Reddy
    Journal of Medical Systems, 2019, 43
  • [45] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135
  • [46] Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
    Wang, Yuecheng
    Zhu, Youwen
    Zhang, Zhiqiang
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2025, 57 (01): : 213 - 224
  • [47] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [48] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [49] An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography
    Sharma, Shikha
    Krishna, C. Rama
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 687 - 693
  • [50] Design of group key agreement protocol using neural key synchronization
    Santhanalakshmi, S.
    Sangeeta, K.
    Patra, G. K.
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 435 - 451