A three round authenticated group key agreement protocol for ad hoc networks

被引:12
|
作者
Augot, Daniel [1 ]
Bhaskar, Raghav [1 ]
Issarny, Valerie [2 ]
Sacchetti, Daniele [2 ]
机构
[1] INRIA Rocquencourt, Projet CODES, F-78153 Le Chesnay, France
[2] INRIA Rocquencourt, Projet ARLES, F-78153 Le Chesnay, France
关键词
Key agreement; Ad hoc networks; Provable security; Cryptographic protocols;
D O I
10.1016/j.pmcj.2006.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal security analysis. In this paper, we propose a simple, efficient and secure GKA protocol well-suited to ad hoc networks and present results of our implementation of the same in a prototype application. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 50 条
  • [41] An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme
    Buettner, Carsten
    Huss, Sorin A.
    INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 139 - 159
  • [42] Authenticated routing for ad hoc networks
    Sanzgiri, K
    LaFlamme, D
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (03) : 598 - 610
  • [43] Authenticated Key Agreement in Group Settings
    李明
    王勇
    谷大武
    白英彩
    Journal of Beijing Institute of Technology, 2006, (02) : 186 - 189
  • [44] Efficient cluster-based group key agreement protocols for wireless ad hoc networks
    Konstantinou, Elisavet
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 384 - 393
  • [45] Round-optimal ID-based dynamic authenticated group key agreement
    Li F.
    Xie D.
    Yan J.
    Gao W.
    Wang X.A.
    International Journal of High Performance Systems Architecture, 2016, 6 (03) : 153 - 161
  • [46] Cryptanalysis of the improved authenticated key agreement protocol
    Chang, TY
    Yang, CC
    Yang, YW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 771 - 774
  • [47] An Improved Certificateless Authenticated Key Agreement Protocol
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 26 - 30
  • [48] A strongly secure and efficient certificateless authenticated asymmetric group key agreement protocol
    Sun H.
    Cai Z.
    Zhang J.
    Zhang L.
    Gan Y.
    Sun, Haiyan (sunhaiyan2520@163.com), 2018, Totem Publishers Ltd (14) : 2831 - 2841
  • [49] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [50] Security analysis and enhancements of a three-party authenticated key agreement protocol
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) : 329 - 336