2016
DOI: 10.1002/sec.1578
|View full text |Cite
|
Sign up to set email alerts
|

An efficient group key agreement protocol for secure P2P communication

Abstract: The efficient design of a distributed group key management for a peer to peer (P2P) network with minimal computation complexity in dynamic secure group communication is a challenging issue. This is because of the absence of a centralized coordinator. In order to provide this facility, a self-composed distributed group key management framework is proposed for secure P2P communication. In this proposed work, group key computation is performed using Chinese remainder theorem and secure communication is performed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 41 publications
0
10
0
Order By: Relevance
“…Vijayakumar et al [29] proposed an efficient key distribution scheme for the Internet pay-TV systems, using only simple computations; the Internet pay-TV key distribution schemes are similar to our scenarios where the service providers need to refresh the group keys for a set of dynamic groups of legitimate users, but there are some key differences between the two scenarios: (1) there is only one message source (the service provider) in the Internet pay-TV key distribution schemes; (2) due to the nature of the grouping of the services, the systems usually adopt some kinds of key hierarchy or tree structures to tackle the key distribution. Vijayakumar et al [30] proposed a Chinese Remainder eory-based distributed group key management scheme which supports the dynamic membership change for the unstructured peer-to-peer networks; the scheme reduces the computational complexity in each user side by slightly increasing the storage space of the peer users. e authors in [31] proposed a new Greatest Common Divisor-based key distribution protocol which aims at reducing the computational complexity and the amount of information stored in the Group Center and the group members; the self-healing function and the message source authentication function were not considered in the requirements.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Vijayakumar et al [29] proposed an efficient key distribution scheme for the Internet pay-TV systems, using only simple computations; the Internet pay-TV key distribution schemes are similar to our scenarios where the service providers need to refresh the group keys for a set of dynamic groups of legitimate users, but there are some key differences between the two scenarios: (1) there is only one message source (the service provider) in the Internet pay-TV key distribution schemes; (2) due to the nature of the grouping of the services, the systems usually adopt some kinds of key hierarchy or tree structures to tackle the key distribution. Vijayakumar et al [30] proposed a Chinese Remainder eory-based distributed group key management scheme which supports the dynamic membership change for the unstructured peer-to-peer networks; the scheme reduces the computational complexity in each user side by slightly increasing the storage space of the peer users. e authors in [31] proposed a new Greatest Common Divisor-based key distribution protocol which aims at reducing the computational complexity and the amount of information stored in the Group Center and the group members; the self-healing function and the message source authentication function were not considered in the requirements.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the scheme [29] is designed for the pay-TV system where the group key updating is triggered by both its membership change and its subscription change, while the key updating of most of other schemes being triggered periodically or being triggered by membership change; the scenario also motivates its design of the hierarchical key structure; it does not need to consider the source authentication since there is only one message source in the pay-TV systems. e scheme [30] is designed for the P2P networks, where the group key management is partially distributed; even though the scheme might seem computationally efficient, we notice that the number of group member is predetermined, the number affects the initial public parameters, and the size of one single encryption expands linearly as the number increases. It is interesting that there are a group of schemes [32] that aim at providing the mutual-healing function which facilitates a node recover the lost keys from the group manager or from its neighbors.…”
Section: Performance Evaluationsmentioning
confidence: 99%
See 2 more Smart Citations
“…A self-authentication and deniable efficient group key agreement protocol is proposed in Refs. [16,17]. The scheme establishes a group between road side units and vehicles by using self-authentication without certification authority.…”
Section: Introductionmentioning
confidence: 99%