Secure and Efficient Tree-based Group Diffie-Hellman Protocol

被引:2
|
作者
Hong, Sunghyuck [1 ]
机构
[1] Texas Tech Univ, Dept Int Affairs, Lubbock, TX 79409 USA
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2009年 / 3卷 / 02期
关键词
Group key agreement; group key management; secure group communication;
D O I
10.3837/tiis.2009.02.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current group key agreement protocols (often tree-based) involve unnecessary delays because members with low-performance computer systems can join group key computation. These delays are caused by the computations needed to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of filtering low performance members in group key generation. This paper presents an efficient tree-based group key agreement protocol and the results of its performance evaluation. The proposed approach to filtering of low performance members in group key generation is scalable and it requires less computational overhead than conventional tree-based protocols.
引用
收藏
页码:178 / 194
页数:17
相关论文
共 50 条
  • [41] Secure E-passport Protocol using Elliptic Curve Diffie-Hellman Key Agreement Protocol
    Abid, Mohamed
    Afifi, Hossam
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 99 - 102
  • [42] Diffie-Hellman key exchange protocol based on ring-LWE
    Zhi-Min, Yu
    Zheng-Jun, Jing
    Shi-Cun, Li
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 1033 - 1037
  • [43] A Diffie-Hellman based Privacy Protocol for Car-to-X Communication
    Stuebing, Hagen
    Ceven, Murat
    Huss, Sorin A.
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 201 - 204
  • [44] Formal Verification in Joux Tripartite Diffie-Hellman Protocol
    Zhu Liehuang
    Zhang Zijian
    Wang Feng
    Guo Cong
    Yuan Caixia
    CHINA COMMUNICATIONS, 2012, 9 (03) : 153 - 163
  • [45] Symbolic protocol analysis with products and Diffie-Hellman exponentiation
    Millen, J
    Shmatikov, V
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 47 - 61
  • [46] A Secure Proxy Signature Scheme Based on the Hardness of the Decisional Diffie-Hellman Problem
    Popescu, Constantin
    STUDIES IN INFORMATICS AND CONTROL, 2012, 21 (03): : 293 - 302
  • [47] Circular-secure encryption from decision Diffie-Hellman
    Boneh, Dan
    Halevi, Shai
    Hamburg, Mike
    Ostrovsky, Rafail
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 108 - +
  • [48] Multipath key exchange scheme based on the Diffie-Hellman protocol and the Shamir threshold
    Ahmat, Daouda
    Choroma, Marayi
    Bissyandé, Tegawendé F.
    International Journal of Network Security, 2019, 21 (03) : 418 - 427
  • [49] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [50] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999