An authenticated group key transfer protocol using elliptic curve cryptography

被引:10
|
作者
Jaiswal, Priyanka [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
Group key transfer protocol; Secret sharing; Confidentiality; Authentication; AGREEMENT PROTOCOL; SCHEME;
D O I
10.1007/s12083-016-0434-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several groupware applications like e-conferences, pay-per view, online games, etc. require a common session key to establish a secure communication among the group participants. For secure communication, such applications often need an efficient group key establishment protocol to construct a common session key for group communications. Conventional group key transfer protocols depends on mutually trusted key generation center (KGC) to generate and distribute the group key to each participant in each session. However, those approaches require extra communication overheads in the server setup. This paper presents an efficient and secure group key transfer protocol using elliptic curve cryptography (ECC). The proposed protocol demonstrates a novel group key transfer protocol, in which one of the group member plays the role of KGC (the protocol without an online KGC, which is based on elliptic curve discrete logarithm problem (ECDLP) and Shamir's secret sharing scheme. The confidentiality of the proposed protocol is ensured by Shamir's secret sharing, i.e., information theoretically secure and provides authentication using ECDLP. Furthermore, the proposed protocol resists against potential attacks (insider and outsider) and also significantly reduces the overheads of the system. The security analysis section of the present work also justifies the security attributes of the proposed protocol under various security assumptions.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 50 条
  • [41] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2023, 82 : 16009 - 16032
  • [42] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [43] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [44] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [45] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [46] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [47] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [48] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
  • [49] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [50] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801