With recent developments in hyperelliptic curve cryptographic system (HECC) processing and the proposed work, the myth that HECC is not suited for practical applications in constrained networks is dispelled. This article proposes dynamic authenticated contributory group key agreement (DACGKA) protocol using HEC-DH. The DACGKA is less costly and ideally appropriate for resource-restricted networks such as VANETs, MANETs, and WSNs because of its lesser key sizes and advancements in operational processing. The suggested protocol is implemented across a finite field using an HEC of genus 1 (ECC), genus 2, and genus 3, with promising results, including a significant reduction in key size and exchange overhead, an increase in key safety, and a broader range of applicability. According to a comparison of the proposed approach on different genus curves, HECC over genus 2 with a suitable key length can be applied for memory and power restricted devices to increase data secrecy and system efficiency. Further, HECC can outperform ECC for low-cost, secure group communication applications.As a part of security analysis, first, we proved that each coordinate of HEC-DH secret value is as hard as the entire DH value, and then concrete security proofs based on the HEC-DLP were established.
K E Y W O R D Sconstraint networks, group key agreement, hyperelliptic curves, Jacobian, key exchange operations
INTRODUCTIONA range of collaborative applications focusing on secure group communication (SGC) is becoming a more active study field in cryptography. It is based on specific distribution and management strategies. All group key agreement (GKA) protocols can be classified into one of two groups. The key is generated by a single group member and distributed to the remaining members in the first. However, it necessitates the involvement of a reliable third party and a safe route between a trustworthy third party and the group members. As a result, key distribution and administration become more complicated. On the other hand, contributory group key agreements (CGKAs) are GKAs in which each member gives a portion of the group key (GK). The focus of this work is on a protocol that falls into the second category.GKA allows SGC across an unprotected, open network by producing the GK. Well-established GKA 1-10 allows participants to agree on a GK in the presence of an alive opponent using signature techniques. To guarantee confidentiality and integrity in the SGC, group members use their authenticated group key with cryptographic techniques.The simplicity and beauty of the 2-party Diffie-Hellman (DH) key agreement 11 has prompted several researchers to apply it to group situations.The majority of GKA protocols are based on DLP. On the other hand, Constraint networks require longer key lengths and higher computational demands. Elliptic curve cryptography (ECC) 12,13 is the natural solution to this problem since, with reduced key sizes, cheaper computational costs, and increased efficiency, it can provide good security.