An authenticated group key transfer protocol using elliptic curve cryptography

被引:10
|
作者
Jaiswal, Priyanka [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
Group key transfer protocol; Secret sharing; Confidentiality; Authentication; AGREEMENT PROTOCOL; SCHEME;
D O I
10.1007/s12083-016-0434-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several groupware applications like e-conferences, pay-per view, online games, etc. require a common session key to establish a secure communication among the group participants. For secure communication, such applications often need an efficient group key establishment protocol to construct a common session key for group communications. Conventional group key transfer protocols depends on mutually trusted key generation center (KGC) to generate and distribute the group key to each participant in each session. However, those approaches require extra communication overheads in the server setup. This paper presents an efficient and secure group key transfer protocol using elliptic curve cryptography (ECC). The proposed protocol demonstrates a novel group key transfer protocol, in which one of the group member plays the role of KGC (the protocol without an online KGC, which is based on elliptic curve discrete logarithm problem (ECDLP) and Shamir's secret sharing scheme. The confidentiality of the proposed protocol is ensured by Shamir's secret sharing, i.e., information theoretically secure and provides authentication using ECDLP. Furthermore, the proposed protocol resists against potential attacks (insider and outsider) and also significantly reduces the overheads of the system. The security analysis section of the present work also justifies the security attributes of the proposed protocol under various security assumptions.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 50 条
  • [21] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [22] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    Journal of Electronics(China), 2005, (03) : 268 - 272
  • [23] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    Journal of Electronics, 2005, (03) : 268 - 272
  • [24] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    Debiao He
    Yitao Chen
    Jianhua Chen
    Arabian Journal for Science and Engineering, 2013, 38 : 2055 - 2061
  • [25] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2055 - 2061
  • [26] An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography
    Sharma, Shikha
    Krishna, C. Rama
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 687 - 693
  • [27] A New Secure Authenticated Group Key Transfer Protocol
    Chingfang Hsu
    Bing Zeng
    Guohua Cui
    Liang Chen
    Wireless Personal Communications, 2014, 74 : 457 - 467
  • [28] A New Secure Authenticated Group Key Transfer Protocol
    Hsu, Chingfang
    Zeng, Bing
    Cui, Guohua
    Chen, Liang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 457 - 467
  • [29] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135
  • [30] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography
    Usha, S.
    Kuppuswami, S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158