A Conference Key Agreement Protocol for Mobile Environment

被引:0
|
作者
Saha, Mounita [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2009年 / 4卷 / 01期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, the popularity of group oriented applications such as electronic conferences and collaboration works have increased manifold. Security is crucial for such collaborative applications which operate in a dynamic network environment and communicate over insecure networks such as internet. The design of secure conference key establishment protocol is essential to provide security to such group applications. Most security protocols currently available in the literature are not fully applicable to wireless environment involving low power mobile devices. Few protocols that have been proposed for wireless environment also lack important security properties and formal proof. One such important property is truly contributory key agreement that has not been addressed previously. In this work we propose a new conference key agreement protocol for mobile environment which addresses the truly contributory property and assures users about their participation in the key computation. The design of the protocol is based on polynomial interpolation. We demonstrate that the protocol is provably secure against active adversaries. The performance analysis of the proposed protocol shows that its well suited for mobile environment.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 50 条
  • [41] A fault-tolerant and secure multi-conference-key agreement protocol
    Shi, TJ
    Guo, YB
    Ma, JF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS - VOL 2: SIGNAL PROCESSING, CIRCUITS AND SYSTEMS, 2004, : 18 - 21
  • [42] Analysis and improvement of a new authenticated group key agreement in a mobile environment
    Qing-Feng Cheng
    Chuan-Gui Ma
    Fu-Shan Wei
    annals of telecommunications - annales des télécommunications, 2011, 66 : 331 - 337
  • [43] Analysis and improvement of a new authenticated group key agreement in a mobile environment
    Cheng, Qing-Feng
    Ma, Chuan-Gui
    Wei, Fu-Shan
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (5-6) : 331 - 337
  • [44] Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment
    Islam, S. K. Hafizul
    Biswas, G. P.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 628 - 635
  • [45] A New Mobile Payment Protocol (GMPCP) By Using A New Group Key Agreement Protocol (VTGKA)
    Vahidalizadehdizaj, Mohammad
    Tao, Lixin
    Jadav, Jigar
    2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 456 - 462
  • [46] A promising key agreement protocol
    Ryu, EK
    Kim, KW
    Yoo, KY
    ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2003, 2906 : 655 - 662
  • [47] Certificateless Key Agreement Protocol
    Chen Yixiang
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 438 - 441
  • [48] Quantum key agreement protocol
    Zhou, N
    Zeng, G
    Xiong, J
    ELECTRONICS LETTERS, 2004, 40 (18) : 1149 - 1150
  • [49] A simple key agreement protocol
    Ryu, EK
    Kim, KW
    Yoo, KY
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 128 - 131
  • [50] Authenticated Key Agreement Protocol
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    CHINA COMMUNICATIONS, 2010, 7 (05) : 1 - 8