Secure group communication using fractional public keys

被引:2
|
作者
Eskeland, Sigurd [1 ]
Oleshchuk, Vladimir [1 ]
机构
[1] Univ Agder, N-4876 Grimstad, Norway
关键词
D O I
10.1109/ARES.2010.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed highly efficiently by using the fractional public keys of multiple participants as exponents. The scheme provides therefore an efficient and elegant way of multi-party key agreement without key establishment data transmissions. The presented cryptographic scheme is collusion resistant to any number of users.
引用
收藏
页码:254 / 257
页数:4
相关论文
共 50 条
  • [1] Secure communication between grid domains based on trust relationships and group keys
    Sadhasivam, G. Sudha
    Jini, C. Geetha
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2010, 5 (03) : 263 - 278
  • [2] Secure group communication with distributed generation of private keys for ad-hoc networks
    Sundaram, S
    Bertok, P
    Burton, B
    [J]. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 477 - 492
  • [3] Secure Group Communication Using Binomial Trees
    Aparna, R.
    Amberker, B. B.
    Pola, Divya
    Bathia, Pranjal
    [J]. 2009 IEEE 3RD INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS 2009), 2009, : 142 - +
  • [4] Secure Communication: Using Fractional Matrix Projective Combination Synchronization
    Khan, Ayub
    Jahanzaib, Lone Seth
    Khan, Taqseer
    Trikha, Pushali
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON FRONTIERS IN INDUSTRIAL AND APPLIED MATHEMATICS (FIAM-2019), 2020, 2253
  • [5] Proposal for Secure Group Communication using Encryption Technology
    Tanada, Shinya
    Suzuki, Hidekazu
    Naito, Katsuhiro
    Watanabe, Akira
    [J]. 2016 NINTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2016, : 68 - 73
  • [6] An extension of secure group communication using key graph
    Zhang, Jun
    Zhou, Yu
    Ma, Fanyuan
    Gu, Dawu
    Bai, Yingcai
    [J]. INFORMATION SCIENCES, 2006, 176 (20) : 3060 - 3078
  • [7] Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys
    Milczarski, Piotr
    Podlaski, Krzysztof
    Hlobaz, Artur
    [J]. COMPUTER NETWORKS, CN 2015, 2015, 522 : 389 - 399
  • [8] Secure Communication Using Modified Fractional and Inverse Matrices Synchronization Methods
    Khan A.
    Trikha P.
    Khan T.
    [J]. SN Computer Science, 2021, 2 (2)
  • [9] A two-channel secure communication using fractional chaotic systems
    Sheu, Long Jye
    Chen, Wei Ching
    Chen, Yen Chu
    Weng, Wei Tai
    [J]. World Academy of Science, Engineering and Technology, 2010, 41 : 1057 - 1061
  • [10] Secure Communication:Using Synchronization On A Novel Fractional Order Chaotic System
    Khan, Ayub
    Trikha, Pushali
    Jahanzaib, Lone Seth
    [J]. 2019 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, CONTROL AND AUTOMATION (ICPECA-2019), 2019, : 463 - 467