Design of group key agreement protocol using neural key synchronization

被引:8
|
作者
Santhanalakshmi, S. [1 ]
Sangeeta, K. [1 ]
Patra, G. K. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, Karnataka, India
[2] CSIR, Paradigm Inst 4, Bangalore 560037, Karnataka, India
关键词
Contributory group key; DH Group Key; Neural Cryptography; Tree Parity Machine; Rekeying;
D O I
10.1080/09720502.2020.1731956
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie-Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 50 条
  • [31] Multi-group key agreement protocol using secret sharing scheme
    Subrahmanyam R.
    Rekha N.R.
    Rao Y.V.S.
    International Journal of Security and Networks, 2023, 18 (03) : 143 - 152
  • [32] A constant rounds group key agreement protocol without using hash functions
    Zhang, Hua
    Wen, Qiao-yan
    Zhang, Jie
    Li, Wen-min
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (06) : 457 - 464
  • [33] A hierarchical group key agreement protocol using orientable attributes for cloud computing
    Zhang, Qikun
    Wang, Xianmin
    Yuan, Junling
    Liu, Lu
    Wang, Ruifang
    Huang, Hong
    Li, Yuanzhang
    INFORMATION SCIENCES, 2019, 480 : 55 - 69
  • [34] An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array
    Jiang, Yi
    Huang, Qingsong
    Zhu, Cheng
    Wang, Yiqiu
    Shen, Jian
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 36 - 40
  • [35] An improved key agreement protocol based on key association set for dynamic peer group
    Wei, Chuyuan
    Hao, Ying
    Lv, Cheng
    Qian, Liping
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 632 - 636
  • [36] A New Mobile Payment Protocol (GMPCP) By Using A New Group Key Agreement Protocol (VTGKA)
    Vahidalizadehdizaj, Mohammad
    Tao, Lixin
    Jadav, Jigar
    2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 456 - 462
  • [37] An efficient group key agreement protocol for ad hoc networks
    Augot, D
    Bhaskar, R
    Issarny, V
    Sacchetti, D
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 576 - 580
  • [38] Secure group key agreement protocol based on chaotic Hash
    Guo, Xianfeng
    Zhang, Jiashu
    INFORMATION SCIENCES, 2010, 180 (20) : 4069 - 4074
  • [39] A group key agreement protocol for intelligent internet of things system
    Zhang, Qikun
    Zhu, Liang
    Li, Yongjiao
    Ma, Zhaorui
    Yuan, Junling
    Zheng, Jun
    Ai, Shan
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (01) : 699 - 722
  • [40] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428