A Conference Key Agreement Protocol for Mobile Environment

被引:0
|
作者
Saha, Mounita [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2009年 / 4卷 / 01期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, the popularity of group oriented applications such as electronic conferences and collaboration works have increased manifold. Security is crucial for such collaborative applications which operate in a dynamic network environment and communicate over insecure networks such as internet. The design of secure conference key establishment protocol is essential to provide security to such group applications. Most security protocols currently available in the literature are not fully applicable to wireless environment involving low power mobile devices. Few protocols that have been proposed for wireless environment also lack important security properties and formal proof. One such important property is truly contributory key agreement that has not been addressed previously. In this work we propose a new conference key agreement protocol for mobile environment which addresses the truly contributory property and assures users about their participation in the key computation. The design of the protocol is based on polynomial interpolation. We demonstrate that the protocol is provably secure against active adversaries. The performance analysis of the proposed protocol shows that its well suited for mobile environment.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 50 条
  • [11] A secure verifiable key agreement protocol for mobile conferencing
    Saha, Mounita
    RoyChowdhury, Dipanwita
    Sengupta, Indranil
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 219 - 222
  • [12] AN EFFICIENT GROUP KEY AGREEMENT PROTOCOL FOR HETEROGENEOUS ENVIRONMENT
    Saha, Mounita
    RoyChowdhury, Dipanwita
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 182 - 189
  • [13] A new authenticated group key agreement in a mobile environment
    Lee, Cheng-Chi
    Lin, Tsung-Hung
    Tsai, Chwei-Shyong
    ANNALS OF TELECOMMUNICATIONS, 2009, 64 (11-12) : 735 - 744
  • [14] A new authenticated group key agreement in a mobile environment
    Cheng-Chi Lee
    Tsung-Hung Lin
    Chwei-Shyong Tsai
    annals of telecommunications - annales des télécommunications, 2009, 64
  • [15] A conference key agreement protocol with fault-tolerant capability
    Huang, Kuo-Hsuan
    Chung, Yu-Fang
    Lee, Hsiu-Hui
    Lai, Feipei
    Chen, Tzer-Shyong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 401 - 405
  • [16] An improved conference-key agreement protocol with forward secrecy
    Tseng, YM
    INFORMATICA, 2005, 16 (02) : 275 - 284
  • [17] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [18] A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
    Hwang, Shin-Jia
    Chai, Ming-Jhang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - 56
  • [19] An authenticated key agreement protocol for mobile ad hoc networks
    Zou, Xukai
    Thukral, Amandeep
    Ramamurthy, Byrav
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 509 - +
  • [20] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +