Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

被引:0
|
作者
Hong, Sunghyuck [1 ]
Lee, Sungjin [1 ]
机构
[1] Baekseok Univ, Informat & Commun Div, Cheonan, South Korea
关键词
Group key management; security; group communication; communication complexity; KEY AGREEMENT; EFFICIENT;
D O I
10.3837/tiis.2013.01.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.
引用
收藏
页码:149 / 165
页数:17
相关论文
共 50 条
  • [31] Multipath key exchange scheme based on the Diffie-Hellman protocol and the Shamir threshold
    Ahmat, Daouda
    Choroma, Marayi
    Bissyandé, Tegawendé F.
    [J]. International Journal of Network Security, 2019, 21 (03) : 418 - 427
  • [32] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999
  • [33] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [34] Efficient group Diffie-Hellman key agreement protocols
    Harn, Lein
    Lin, Changlu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1972 - 1980
  • [35] mOT plus : An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group
    Tian, Baoping
    Wei, Fushan
    Ma, Chuangui
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 407 - 421
  • [36] Modeling Diffie-Hellman Derivability for Automated Analysis
    Liskov, Moses
    Thayer, F. Javier
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 232 - 243
  • [37] The oracle Diffie-Hellman assumptions and an analysis of DHIES
    Abdalla, M
    Bellare, M
    Rogaway, P
    [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 143 - 158
  • [38] Security analysis of the strong Diffie-Hellman problem
    Cheon, Jung Hee
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 1 - 11
  • [39] Extensions of the Diffie-Hellman Key Agreement Protocol Based on Exponential and Logarithmic Functions
    Lipinski, Zbigniew
    Mizera-Pietraszko, Jolanta
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 569 - 581
  • [40] Democratic group signatures with linkability from gap Diffie-Hellman group
    Liu Y.-B.
    Li X.-X.
    Qian H.-F.
    Zhang W.-Z.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 688 - 691