An authenticated group key transfer protocol using elliptic curve cryptography

被引:10
|
作者
Jaiswal, Priyanka [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
Group key transfer protocol; Secret sharing; Confidentiality; Authentication; AGREEMENT PROTOCOL; SCHEME;
D O I
10.1007/s12083-016-0434-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several groupware applications like e-conferences, pay-per view, online games, etc. require a common session key to establish a secure communication among the group participants. For secure communication, such applications often need an efficient group key establishment protocol to construct a common session key for group communications. Conventional group key transfer protocols depends on mutually trusted key generation center (KGC) to generate and distribute the group key to each participant in each session. However, those approaches require extra communication overheads in the server setup. This paper presents an efficient and secure group key transfer protocol using elliptic curve cryptography (ECC). The proposed protocol demonstrates a novel group key transfer protocol, in which one of the group member plays the role of KGC (the protocol without an online KGC, which is based on elliptic curve discrete logarithm problem (ECDLP) and Shamir's secret sharing scheme. The confidentiality of the proposed protocol is ensured by Shamir's secret sharing, i.e., information theoretically secure and provides authentication using ECDLP. Furthermore, the proposed protocol resists against potential attacks (insider and outsider) and also significantly reduces the overheads of the system. The security analysis section of the present work also justifies the security attributes of the proposed protocol under various security assumptions.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 50 条
  • [1] An authenticated group key transfer protocol using elliptic curve cryptography
    Priyanka Jaiswal
    Sachin Tripathi
    Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
  • [2] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [3] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [4] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [5] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [6] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [7] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
  • [8] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [9] Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 167 - 186
  • [10] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815