An authenticated group key transfer protocol using elliptic curve cryptography

被引:10
作者
Jaiswal, Priyanka [1 ]
Tripathi, Sachin [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad, Jharkhand, India
关键词
Group key transfer protocol; Secret sharing; Confidentiality; Authentication; AGREEMENT PROTOCOL; SCHEME;
D O I
10.1007/s12083-016-0434-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several groupware applications like e-conferences, pay-per view, online games, etc. require a common session key to establish a secure communication among the group participants. For secure communication, such applications often need an efficient group key establishment protocol to construct a common session key for group communications. Conventional group key transfer protocols depends on mutually trusted key generation center (KGC) to generate and distribute the group key to each participant in each session. However, those approaches require extra communication overheads in the server setup. This paper presents an efficient and secure group key transfer protocol using elliptic curve cryptography (ECC). The proposed protocol demonstrates a novel group key transfer protocol, in which one of the group member plays the role of KGC (the protocol without an online KGC, which is based on elliptic curve discrete logarithm problem (ECDLP) and Shamir's secret sharing scheme. The confidentiality of the proposed protocol is ensured by Shamir's secret sharing, i.e., information theoretically secure and provides authentication using ECDLP. Furthermore, the proposed protocol resists against potential attacks (insider and outsider) and also significantly reduces the overheads of the system. The security analysis section of the present work also justifies the security attributes of the proposed protocol under various security assumptions.
引用
收藏
页码:857 / 864
页数:8
相关论文
共 33 条
  • [1] [Anonymous], 2002, CRYPTOGRAPHY THEORY
  • [2] [Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
  • [3] [Anonymous], 2004, 80211I2004 IEEE
  • [4] [Anonymous], P CODES CIPHERS CRYP
  • [5] Berkovits S, 2001, LNCS, V547, P535
  • [6] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [7] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [8] Blundo C., 1992, P ANN INT CRYPT C, DOI DOI 10.1007/3-540-48071-433
  • [9] Bohli JM, 2006, LECT NOTES COMPUT SC, V3982, P355, DOI 10.1007/11751595_39
  • [10] Boyd C, 1997, LECT NOTES COMPUT SC, V1270, P294, DOI 10.1007/BFb0027936