Multi-group key agreement protocol using secret sharing scheme

被引:0
|
作者
Subrahmanyam R. [1 ]
Rekha N.R. [1 ]
Rao Y.V.S. [1 ]
机构
[1] School of Computer and Information Sciences, University of Hyderabad, Hyderabad
关键词
DH; Diffie-Hellman; GDH; GKAP; group Diffie-Hellman; group key agreement protocol; KAP; KE; key agreement protocol; key exchange; secret sharing scheme; SSS; verifiable secret sharing;
D O I
10.1504/IJSN.2023.134119
中图分类号
学科分类号
摘要
The group key agreement protocol allows a group of participants to agree on a one time session key and use it to protect future group oriented communication across an insecure network. In literature, secret sharing schemes, bilinear pairings, and polynomials were commonly used to distribute group key related information to the group participants. However, all these schemes work only for a single group but not for multiple groups. Hence, we propose a multi-group key agreement protocol based on a secret sharing scheme in this paper. This scheme is relevant in scenarios where groups are the most elementary entities for communication as opposed to individuals. Any threshold t or more participants could reconstruct the secret in every group. If there are t − 1 or fewer participants in any group, the secret cannot be obtained in those particular groups. The correctness of the scheme and security analysis are discussed. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:143 / 152
页数:9
相关论文
共 50 条
  • [41] Efficient group authentication in RFID using secret sharing scheme
    Liu, Yanxiao
    Sun, Qindong
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8605 - S8611
  • [42] Secret sharing-based authentication and key agreement protocol for machine-type communications
    Lopes, Ana Paula G.
    Hilgert, Lucas O.
    Gondim, Paulo R. L.
    Lloret, Jaime
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [43] Design of group key agreement protocol using neural key synchronization
    Santhanalakshmi, S.
    Sangeeta, K.
    Patra, G. K.
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 435 - 451
  • [44] ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid
    Wang, Xiaofeng
    Wang, Shangping
    ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, AICI 2010, PT II, 2010, 6320 : 259 - 266
  • [45] Rational multi-secret sharing scheme based on bit commitment protocol
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    Journal of Networks, 2012, 7 (04) : 738 - 745
  • [46] A Tree Key Graph Design Scheme for Hierarchical Multi-Group Access Control
    Koo, Han-Seung
    Kwon, O-Hyung
    Ra, Sung-Woong
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (11) : 874 - 876
  • [47] Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks
    Goto, Shinichi
    Iwamura, Keiichi
    Suga, Yuji
    Kaneda, Kitahiro
    WINSYS: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 6, 2016, : 172 - 180
  • [48] Secure Protocol with Variable Security Level Using Secret Sharing Scheme
    Ueno, Shohei
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Sato, Hiroyuki
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 626 - 627
  • [49] Satellite Multi-Group Key Management
    Sun, Yanming
    Ma, Hengtai
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 894 - 899
  • [50] Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud
    Islam, Md Azharul
    Madria, Sanjay K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2158 - 2172