2018
DOI: 10.29055/jcms/971
|View full text |Cite
|
Sign up to set email alerts
|

An Authenticated and Secure Group Key Transfer Protocol with Circulant Matrices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 0 publications
0
0
0
Order By: Relevance
“…In [21] explain difference the Cost of computation of [19] and [21] as mentioned table 3 in [22] and our protocol it is clear computation cost is less than [22] because diversity between modular addition and subtraction not just modular multiplication as [22] use. The time for performing modular addition or subtraction required in the proposed scheme can be ignored [21]. So the computational cost of our protocol less.…”
Section: Comparisonmentioning
confidence: 72%
See 3 more Smart Citations
“…In [21] explain difference the Cost of computation of [19] and [21] as mentioned table 3 in [22] and our protocol it is clear computation cost is less than [22] because diversity between modular addition and subtraction not just modular multiplication as [22] use. The time for performing modular addition or subtraction required in the proposed scheme can be ignored [21]. So the computational cost of our protocol less.…”
Section: Comparisonmentioning
confidence: 72%
“…As for the length of the key the least is 4 byte. In this paper we camper our protocol with [21] in term of performance where we use a long-term secret key and random number as the author mentioned in his example as simple numbers but the result was simple keys within close groups compared to our results as explain 1 figure. While we use privet key as a long-term secret key and public key as a random number the Nathani's scheme spent 12.9 minute when it is ran with 10 group and each of group have 10 all groups are generated 1000 key, while minimum when it is ran with 3 groups and each group have 3 to generate 27 Kseckey , spent 0.04 second as explain in figure 2.…”
Section: Comparisonmentioning
confidence: 83%
See 2 more Smart Citations