An authenticated group key transfer protocol using elliptic curve cryptography

被引:10
|
作者
Jaiswal, Priyanka [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
Group key transfer protocol; Secret sharing; Confidentiality; Authentication; AGREEMENT PROTOCOL; SCHEME;
D O I
10.1007/s12083-016-0434-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several groupware applications like e-conferences, pay-per view, online games, etc. require a common session key to establish a secure communication among the group participants. For secure communication, such applications often need an efficient group key establishment protocol to construct a common session key for group communications. Conventional group key transfer protocols depends on mutually trusted key generation center (KGC) to generate and distribute the group key to each participant in each session. However, those approaches require extra communication overheads in the server setup. This paper presents an efficient and secure group key transfer protocol using elliptic curve cryptography (ECC). The proposed protocol demonstrates a novel group key transfer protocol, in which one of the group member plays the role of KGC (the protocol without an online KGC, which is based on elliptic curve discrete logarithm problem (ECDLP) and Shamir's secret sharing scheme. The confidentiality of the proposed protocol is ensured by Shamir's secret sharing, i.e., information theoretically secure and provides authentication using ECDLP. Furthermore, the proposed protocol resists against potential attacks (insider and outsider) and also significantly reduces the overheads of the system. The security analysis section of the present work also justifies the security attributes of the proposed protocol under various security assumptions.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 50 条
  • [31] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [32] Authenticated Key Exchange Protocol using Neural Cryptography with Secret Boundaries
    Allam, Ahmed M.
    Abbas, Hazem M.
    El-Kharashi, M. Watheq
    2013 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2013,
  • [33] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [34] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [35] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [36] Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Harn, Lein
    Lin, Changlu
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 842 - 846
  • [37] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Shehzad Ashraf Chaudhry
    Mohammad Sabzinejad Farash
    Husnain Naqvi
    Muhammad Sher
    Electronic Commerce Research, 2016, 16 : 113 - 139
  • [38] An Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Sun, Yi
    Wen, Qiaoyan
    Sun, Hongxiang
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 403 - 408
  • [39] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [40] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032