Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

被引:0
|
作者
Hong, Sunghyuck [1 ]
Lee, Sungjin [1 ]
机构
[1] Baekseok Univ, Informat & Commun Div, Cheonan, South Korea
关键词
Group key management; security; group communication; communication complexity; KEY AGREEMENT; EFFICIENT;
D O I
10.3837/tiis.2013.01.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.
引用
收藏
页码:149 / 165
页数:17
相关论文
共 50 条
  • [1] Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)
    Hong, Sunghyuck
    Lee, Sungjin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (07): : 1737 - 1753
  • [2] The performance of group Diffie-Hellman paradigms
    Hagzan, KS
    Bischof, HP
    [J]. ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 88 - 94
  • [3] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [4] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [5] The group Diffie-Hellman problems
    Bresson, E
    Chevassut, O
    Pointcheval, D
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 325 - 338
  • [6] Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
    Millen, Jonathan
    Shmatikov, Vitaly
    [J]. JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 515 - 564
  • [7] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [8] Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATICA, 2010, 21 (02) : 247 - 258
  • [9] An Algebra for Symbolic Diffie-Hellman Protocol Analysis
    Dougherty, Daniel J.
    Guttman, Joshua D.
    [J]. TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 164 - 181
  • [10] Secure and Efficient Tree-based Group Diffie-Hellman Protocol
    Hong, Sunghyuck
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (02): : 178 - 194