Design of group key agreement protocol using neural key synchronization

被引:8
|
作者
Santhanalakshmi, S. [1 ]
Sangeeta, K. [1 ]
Patra, G. K. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, Karnataka, India
[2] CSIR, Paradigm Inst 4, Bangalore 560037, Karnataka, India
关键词
Contributory group key; DH Group Key; Neural Cryptography; Tree Parity Machine; Rekeying;
D O I
10.1080/09720502.2020.1731956
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie-Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 50 条
  • [41] Group key agreement protocol for edge computing in industrial internet
    Yin, Yifeng
    Wang, Zhaobo
    Zhou, Wanyi
    Gan, Yong
    Zhang, Yanhua
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (12) : 12730 - 12743
  • [42] A group key agreement protocol based on ECDH and short signature
    Yang, Zeyu
    Wang, Ziqing
    Qiu, Fei
    Li, Fagen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [43] A novel group key agreement protocol for wireless mesh network
    You Z.
    Xie X.
    Journal of Convergence Information Technology, 2011, 6 (02) : 86 - 101
  • [44] Authenticated Asymmetric Group Key Agreement Protocol and Its Application
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [45] An efficient group key agreement protocol from bilinear pairings
    Hu, Chengyu
    Liu, Pengtao
    Li, Daxing
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 737 - +
  • [46] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [47] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [48] A Novel Group Key Agreement Protocol for Wireless Sensor Networks
    Zhang Li-Ping
    Wang Yi
    Li Gui-Ling
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 513 - +
  • [49] An efficient fault-tolerant group key agreement protocol
    Zhao, Jianjie
    Gu, Dawu
    Li, Yali
    COMPUTER COMMUNICATIONS, 2010, 33 (07) : 890 - 895
  • [50] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 180 - +