2015
DOI: 10.1002/sec.1402
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure group key agreement protocol based on ECDH with integrated signature

Abstract: This paper proposes a new two round authenticated contributory group key agreement (ACGKA) protocol based on elliptic curve Diffie-Hellman (ECDH) with integrated signature. In this technique, one node is picked up as the group controller, and this node runs an authenticated ECDH with the rest of the nodes to generate an authenticated shared key per each twoparty. It then merges these keys in another round in such a way that every member obtains the identical authenticated group key. Further, ACGKA is extended … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
18
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…Two-party DH-key agreement [34] is the origin for enormous amount of consequent GKA schemes. The majority of distributed/contributory-GKA protocols rely on generalizations of 2-party DH or its extensions [3,7,16,[35][36][37][38][39]. Key management in distributed/contributory-GKA are less difficult to deal with in each subgroup/cluster compared to the whole ad hoc network.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Two-party DH-key agreement [34] is the origin for enormous amount of consequent GKA schemes. The majority of distributed/contributory-GKA protocols rely on generalizations of 2-party DH or its extensions [3,7,16,[35][36][37][38][39]. Key management in distributed/contributory-GKA are less difficult to deal with in each subgroup/cluster compared to the whole ad hoc network.…”
Section: Related Workmentioning
confidence: 99%
“…The management techniques for computational overheads must be considered into account. As ECDH is lightweight and efficient when compared to regular DH, the ECCbase [15] is used to secure dynamic authenticated GKAs: Consequently, in this paper an ECC-based NM-GKA [16] is used as a pre-requisite for the proposed protocol.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Lemma For any adversary 𝒜 who is computationally unbounded, the following holds: Prob [( T , sk 0 ) ← Fake ; sk 1 ← G ; b ← { 0 , 1 } :𝒜 ( T , sk b ) = b ] = 1/2 .Proof This lemma is to deal with the Test query, the proof of which follows from the fact that in Fake the session key sk is completely independent of the transcript T generated there and Using the same techniques as in lemma 2 of Naresh . ◻…”
Section: Security Analysis Of Hec‐dhmentioning
confidence: 99%