2015
DOI: 10.1007/s12046-015-0434-y
|View full text |Cite
|
Sign up to set email alerts
|

A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure

Abstract: In this paper a new two-round authenticated contributory group key agreement based on Elliptic Curve Diffie-Hellman protocol with Privacy Preserving Public Key Infrastructure (PP-PKI) is introduced and is extended to a dynamic authenticated contributory group key agreement with join and leave protocols for dynamic groups. The proposed protocol provides such security attributes as forward secrecy, backward secrecy, and defense against man in the middle (MITM) and Unknown keyshare security attacks and also authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…The greater part of distributed/contributory-GKAs is extensions or generalizations of 2-party DH. [2][3][4][5][6] The management of keys in contributory/distributed-GKA [7][8][9][10][11] is less complex to deal with within each cluster/subgroup relative to approaches that deal with the entire group. In this direction, contemporary works 5,6,[12][13][14][15][16][17] chose cluster/subgroup-based schemes 14,16 in which the entire group is divided into clusters.…”
Section: Related Workmentioning
confidence: 99%
“…The greater part of distributed/contributory-GKAs is extensions or generalizations of 2-party DH. [2][3][4][5][6] The management of keys in contributory/distributed-GKA [7][8][9][10][11] is less complex to deal with within each cluster/subgroup relative to approaches that deal with the entire group. In this direction, contemporary works 5,6,[12][13][14][15][16][17] chose cluster/subgroup-based schemes 14,16 in which the entire group is divided into clusters.…”
Section: Related Workmentioning
confidence: 99%
“…Two-party DH-key agreement [34] is the origin for enormous amount of consequent GKA schemes. The majority of distributed/contributory-GKA protocols rely on generalizations of 2-party DH or its extensions [3,7,16,[35][36][37][38][39]. Key management in distributed/contributory-GKA are less difficult to deal with in each subgroup/cluster compared to the whole ad hoc network.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of CK-GKAs' [18,20,21,25,26,30,31,35,39,[40][41][42] presume a hierarchical framework of the clusters or hierarchical structure, then execute a natural key agreement schemes such as, D-H [34] or the Burmester and Desmedt (BD) [3] GKA scheme, or a variety GKA schemes [3,7,16,[35][36][37][38][39] is at first implemented locally in each cluster, after that utilize these CKs in the next level with equivalent or an alternate key agreement scheme among CHs' to generate the whole group key. For further information on a comparison of the existing protocols [18,21,25,26,28,30,31,33,43] in this direction, one can refer to Table 2, summary of the key characteristics of cluster based protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In cryptographic algorithm the procedures of Key generation, Encryption and Decryption is used. It also provides zero knowledge proofs that the contents of the encrypted vote check for the validity [16]. After voting has closed, the voting authorities use the Encryption Schemes.…”
Section: Proposed Systemmentioning
confidence: 99%