A Conference Key Agreement Protocol for Mobile Environment

被引:0
|
作者
Saha, Mounita [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, the popularity of group oriented applications such as electronic conferences and collaboration works have increased manifold. Security is crucial for such collaborative applications which operate in a dynamic network environment and communicate over insecure networks such as internet. The design of secure conference key establishment protocol is essential to provide security to such group applications. Most security protocols currently available in the literature are not fully applicable to wireless environment involving low power mobile devices. Few protocols that have been proposed for wireless environment also lack important security properties and formal proof. One such important property is truly contributory key agreement that has not been addressed previously. In this work we propose a new conference key agreement protocol for mobile environment which addresses the truly contributory property and assures users about their participation in the key computation. The design of the protocol is based on polynomial interpolation. We demonstrate that the protocol is provably secure against active adversaries. The performance analysis of the proposed protocol shows that its well suited for mobile environment.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 50 条
  • [1] A novel authenticated group key agreement protocol for mobile environment
    Jia-Lun Tsai
    annals of telecommunications - annales des télécommunications, 2011, 66 : 663 - 669
  • [2] A provable authenticated group key agreement protocol for mobile environment
    Sun, Hung-Min
    He, Bing-Zhe
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Lin, Chia-Hsien
    Wang, Huaxiong
    INFORMATION SCIENCES, 2015, 321 : 224 - 237
  • [4] An Improved Conference Key Agreement Protocol
    Zhang Xing-lan
    Wang Quan-min
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 877 - 881
  • [5] A DDH-based Group Key Agreement Protocol for Mobile Environment
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 580 - 581
  • [6] A New Mutual Authentication and Key Agreement Protocol for Mobile Client-Server Environment
    Tsobdjou, Loic D.
    Pierre, Samuel
    Quintero, Alejandro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1275 - 1286
  • [7] New conference key agreement protocol with user anonymity
    Kim, WH
    Ryu, EK
    Im, JY
    Yoo, KY
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 185 - 190
  • [8] Conference key agreement protocol based on elliptic curve
    Cai, Yong-Quan
    Wang, Ya-Li
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2007, 33 (08): : 870 - 873
  • [9] On key agreement and conference key agreement
    Boyd, C
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 294 - 302
  • [10] CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
    Ottaviani, Vittorio
    Zanoni, Alberto
    Regoli, Massimo
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 411 - 416