An ECC‐based authenticated group key exchange protocol in IBE framework

Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group memb...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems 2017-12, Vol.30 (18), p.n/a
Hauptverfasser: Gupta, Daya Sagar, Biswas, G. P.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 18
container_start_page
container_title International journal of communication systems
container_volume 30
creator Gupta, Daya Sagar
Biswas, G. P.
description Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
doi_str_mv 10.1002/dac.3363
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1968339191</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1968339191</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</originalsourceid><addsrcrecordid>eNp1kE1OwzAQRi0EEqUgcQRLbNik2Jk0iZclBKhUiQ2srbHjtOlPXOxEpTuOwBk5CS5ly2rmk55mPj1Crjkbccbiuwr1CCCFEzLgTIiIc-Cnhz1LojGM-Tm58H7JGMvjdDwg00lLy6L4_vxS6E1Fse8Wpu0ajV1Ic2f7LV2ZPTUfeoHt3NCts53Vdk2blk7vS1o73JiddatLclbj2purvzkkb4_la_EczV6epsVkFulYAES51hlkLFYmz3WSKKGgTlWVhH5Y54hVquNEVxASE2gyUErXKctMgDgqAUNyc7wbmrz3xndyaXvXhpeSizQHEFzwQN0eKe2s987UcuuaDbq95EweRMkgSh5EBTQ6ortmbfb_cvJhUvzyPwcfafA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1968339191</pqid></control><display><type>article</type><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><source>Access via Wiley Online Library</source><creator>Gupta, Daya Sagar ; Biswas, G. P.</creator><creatorcontrib>Gupta, Daya Sagar ; Biswas, G. P.</creatorcontrib><description>Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.3363</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; bilinear pairing ; Complexity ; Cryptography ; elliptic curve cryptography ; Exchanging ; group key exchange ; Private networks ; Protocol ; Protocol (computers) ; secure communication ; Security ; Virtual networks</subject><ispartof>International journal of communication systems, 2017-12, Vol.30 (18), p.n/a</ispartof><rights>Copyright © 2017 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</citedby><cites>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</cites><orcidid>0000-0001-5401-7287</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.3363$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.3363$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Gupta, Daya Sagar</creatorcontrib><creatorcontrib>Biswas, G. P.</creatorcontrib><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><title>International journal of communication systems</title><description>Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</description><subject>authentication</subject><subject>bilinear pairing</subject><subject>Complexity</subject><subject>Cryptography</subject><subject>elliptic curve cryptography</subject><subject>Exchanging</subject><subject>group key exchange</subject><subject>Private networks</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>secure communication</subject><subject>Security</subject><subject>Virtual networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kE1OwzAQRi0EEqUgcQRLbNik2Jk0iZclBKhUiQ2srbHjtOlPXOxEpTuOwBk5CS5ly2rmk55mPj1Crjkbccbiuwr1CCCFEzLgTIiIc-Cnhz1LojGM-Tm58H7JGMvjdDwg00lLy6L4_vxS6E1Fse8Wpu0ajV1Ic2f7LV2ZPTUfeoHt3NCts53Vdk2blk7vS1o73JiddatLclbj2purvzkkb4_la_EczV6epsVkFulYAES51hlkLFYmz3WSKKGgTlWVhH5Y54hVquNEVxASE2gyUErXKctMgDgqAUNyc7wbmrz3xndyaXvXhpeSizQHEFzwQN0eKe2s987UcuuaDbq95EweRMkgSh5EBTQ6ortmbfb_cvJhUvzyPwcfafA</recordid><startdate>201712</startdate><enddate>201712</enddate><creator>Gupta, Daya Sagar</creator><creator>Biswas, G. P.</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-5401-7287</orcidid></search><sort><creationdate>201712</creationdate><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><author>Gupta, Daya Sagar ; Biswas, G. P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>authentication</topic><topic>bilinear pairing</topic><topic>Complexity</topic><topic>Cryptography</topic><topic>elliptic curve cryptography</topic><topic>Exchanging</topic><topic>group key exchange</topic><topic>Private networks</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>secure communication</topic><topic>Security</topic><topic>Virtual networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Daya Sagar</creatorcontrib><creatorcontrib>Biswas, G. P.</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gupta, Daya Sagar</au><au>Biswas, G. P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An ECC‐based authenticated group key exchange protocol in IBE framework</atitle><jtitle>International journal of communication systems</jtitle><date>2017-12</date><risdate>2017</risdate><volume>30</volume><issue>18</issue><epage>n/a</epage><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/dac.3363</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-5401-7287</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1074-5351
ispartof International journal of communication systems, 2017-12, Vol.30 (18), p.n/a
issn 1074-5351
1099-1131
language eng
recordid cdi_proquest_journals_1968339191
source Access via Wiley Online Library
subjects authentication
bilinear pairing
Complexity
Cryptography
elliptic curve cryptography
Exchanging
group key exchange
Private networks
Protocol
Protocol (computers)
secure communication
Security
Virtual networks
title An ECC‐based authenticated group key exchange protocol in IBE framework
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T15%3A51%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20ECC%E2%80%90based%20authenticated%20group%20key%20exchange%20protocol%20in%20IBE%20framework&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Gupta,%20Daya%20Sagar&rft.date=2017-12&rft.volume=30&rft.issue=18&rft.epage=n/a&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.3363&rft_dat=%3Cproquest_cross%3E1968339191%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1968339191&rft_id=info:pmid/&rfr_iscdi=true