Design of group key agreement protocol using neural key synchronization

被引:8
|
作者
Santhanalakshmi, S. [1 ]
Sangeeta, K. [1 ]
Patra, G. K. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, Karnataka, India
[2] CSIR, Paradigm Inst 4, Bangalore 560037, Karnataka, India
关键词
Contributory group key; DH Group Key; Neural Cryptography; Tree Parity Machine; Rekeying;
D O I
10.1080/09720502.2020.1731956
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie-Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 50 条
  • [1] Key Exposure Resistant Group Key Agreement Protocol
    Zhou, Tianqi
    Shen, Jian
    Ji, Sai
    Ren, Yongjun
    Zhang, Mingwu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 83 - 97
  • [2] Group key agreement protocol using bilinear pairing
    Elsheh, Esam
    Ben Hmaza, A.
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 536 - +
  • [3] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [4] An efficient group key agreement protocol
    Jung, BE
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (02) : 106 - 107
  • [5] On the security of a group key agreement protocol
    Tang, Qiang
    COMPUTER JOURNAL, 2007, 50 (05): : 589 - 590
  • [6] Design and implementation of group key agreement protocol for wireless sensor network
    Zhu, Lie-Huang
    Liu, Dan
    Wang, Fei
    Liu, Han-Nan
    Zhan, Pei-Xing
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2012, 13 (03): : 266 - 270
  • [7] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +
  • [8] A key agreement protocol based on group actions
    Cagman, Abdullah
    Polat, Kadirhan
    Tas, Sait
    NUMERICAL METHODS FOR PARTIAL DIFFERENTIAL EQUATIONS, 2021, 37 (02) : 1112 - 1119
  • [9] A secure key agreement protocol for dynamic group
    Muhammad Bilal
    Shin-Gak Kang
    Cluster Computing, 2017, 20 : 2779 - 2792
  • [10] A secure key agreement protocol for dynamic group
    Bilal, Muhammad
    Kang, Shin-Gak
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2779 - 2792