Design of group key agreement protocol using neural key synchronization

被引:8
|
作者
Santhanalakshmi, S. [1 ]
Sangeeta, K. [1 ]
Patra, G. K. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, Karnataka, India
[2] CSIR, Paradigm Inst 4, Bangalore 560037, Karnataka, India
关键词
Contributory group key; DH Group Key; Neural Cryptography; Tree Parity Machine; Rekeying;
D O I
10.1080/09720502.2020.1731956
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie-Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 50 条
  • [21] Authenticated Group Key Agreement Protocol Without Pairing
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Kuchta, Veronika
    Markowitch, Olivier
    Bala, Suman
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 606 - 618
  • [22] Efficient and secure group key agreement protocol in MANET
    Wang, Gang
    Wen, Tao
    Guo, Quan
    Ma, Xue-Bin
    Tongxin Xuebao/Journal on Communications, 2009, 30 (12): : 68 - 78
  • [23] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [24] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [25] The effect of rebalancing on the performance of a group key agreement protocol
    Zheng, Shanyu
    Alves-Foss, Jim
    Lee, Stephen S.
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 983 - +
  • [26] AN EFFICIENT GROUP KEY AGREEMENT PROTOCOL FOR HETEROGENEOUS ENVIRONMENT
    Saha, Mounita
    RoyChowdhury, Dipanwita
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 182 - 189
  • [27] A Dynamic Scheme For Authenticated Group Key Agreement Protocol
    Yu, Yang
    Zhang, Aixin
    Tang, Junhua
    Chen, Haopeng
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 245 - 250
  • [28] Queue-based group key agreement protocol
    Office of International Affairs, Texas Tech University, 601 Indiana, Lubbock, TX, United States
    Int. J. Netw. Secur., 2009, 2 (135-142):
  • [29] Security analysis of joint group key agreement protocol
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1876 - 1878
  • [30] Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design
    Wang, Ning
    Zhang, Ning
    Gulliver, T. Aaron
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) : 272 - 284