Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography

被引:0
作者
Jaiswal, Priyanka [1 ]
Kumar, Abhimanyu [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
来源
2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA) | 2014年
关键词
Group Key Agreement; Secure Communication; Elliptic Curve Cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure group communication is an important research area in the field of cryptography and network security, because the group communication like electronic conferences, video chatting, video games etc. are rapidly increasing. Group key agreement protocols allow all members of the group to agree on the same session key which is used later for secure group communication. The design of secure group key agreement protocol can be very critical for achieving security goals. Many group key agreement protocols have been established for wired and wireless group communication. This paper proposes an ECC (Elliptic Curve Cryptography) based authenticated group key agreement protocol for wireless scenario. The proposed protocol uses the concepts of elliptic curve cryptography to minimize the computation overheads and AES (Asymmetric Encryption Standards) to maintain efficiency. The proposed protocol consists of a set of users and a trusted server, where server and the user contribute to create the group key. The performance and security analysis shows that the proposed protocol is secure against passive and active attack and performs better in terms of computation and communication cost from other related protocols.
引用
收藏
页数:6
相关论文
共 10 条
  • [1] Aydos M., 1998, 2 INT WORKSH DISCR A
  • [2] Hankerson D., SPRINGER PROFESSIONA
  • [3] A CONFERENCE KEY DISTRIBUTION-SYSTEM
    INGEMARSSON, I
    TANG, DT
    WONG, CK
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1982, 28 (05) : 714 - 720
  • [4] Kar Jayaprakash, 2010, 2010 2nd International Conference on Computer Engineering and Technology (ICCET), P78, DOI 10.1109/ICCET.2010.5485778
  • [5] Kumar K., 2010, INT J COMPUTER SCI I, V8, P65
  • [6] Muthumayil K., 2011, 2011 Proceedings of International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011), P1051, DOI 10.1109/ICETECT.2011.5760274
  • [7] A resource-constrained group key agreement protocol for imbalanced wireless networks
    Tseng, Yuh-Min
    [J]. COMPUTERS & SECURITY, 2007, 26 (04) : 331 - 337
  • [8] Wang Y, 2006, IEEE ICC, P2243
  • [9] Yongliang L., 2007, INT J NETWORK SECURI, V5, P327
  • [10] Zhu LH, 2006, INT J COMPUT SCI NET, V6, P131