An ECC‐based authenticated group key exchange protocol in IBE framework
Summary With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group memb...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2017-12, Vol.30 (18), p.n/a |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 18 |
container_start_page | |
container_title | International journal of communication systems |
container_volume | 30 |
creator | Gupta, Daya Sagar Biswas, G. P. |
description | Summary
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. |
doi_str_mv | 10.1002/dac.3363 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1968339191</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1968339191</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</originalsourceid><addsrcrecordid>eNp1kE1OwzAQRi0EEqUgcQRLbNik2Jk0iZclBKhUiQ2srbHjtOlPXOxEpTuOwBk5CS5ly2rmk55mPj1Crjkbccbiuwr1CCCFEzLgTIiIc-Cnhz1LojGM-Tm58H7JGMvjdDwg00lLy6L4_vxS6E1Fse8Wpu0ajV1Ic2f7LV2ZPTUfeoHt3NCts53Vdk2blk7vS1o73JiddatLclbj2purvzkkb4_la_EczV6epsVkFulYAES51hlkLFYmz3WSKKGgTlWVhH5Y54hVquNEVxASE2gyUErXKctMgDgqAUNyc7wbmrz3xndyaXvXhpeSizQHEFzwQN0eKe2s987UcuuaDbq95EweRMkgSh5EBTQ6ortmbfb_cvJhUvzyPwcfafA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1968339191</pqid></control><display><type>article</type><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><source>Access via Wiley Online Library</source><creator>Gupta, Daya Sagar ; Biswas, G. P.</creator><creatorcontrib>Gupta, Daya Sagar ; Biswas, G. P.</creatorcontrib><description>Summary
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.3363</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; bilinear pairing ; Complexity ; Cryptography ; elliptic curve cryptography ; Exchanging ; group key exchange ; Private networks ; Protocol ; Protocol (computers) ; secure communication ; Security ; Virtual networks</subject><ispartof>International journal of communication systems, 2017-12, Vol.30 (18), p.n/a</ispartof><rights>Copyright © 2017 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</citedby><cites>FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</cites><orcidid>0000-0001-5401-7287</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.3363$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.3363$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Gupta, Daya Sagar</creatorcontrib><creatorcontrib>Biswas, G. P.</creatorcontrib><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><title>International journal of communication systems</title><description>Summary
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</description><subject>authentication</subject><subject>bilinear pairing</subject><subject>Complexity</subject><subject>Cryptography</subject><subject>elliptic curve cryptography</subject><subject>Exchanging</subject><subject>group key exchange</subject><subject>Private networks</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>secure communication</subject><subject>Security</subject><subject>Virtual networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kE1OwzAQRi0EEqUgcQRLbNik2Jk0iZclBKhUiQ2srbHjtOlPXOxEpTuOwBk5CS5ly2rmk55mPj1Crjkbccbiuwr1CCCFEzLgTIiIc-Cnhz1LojGM-Tm58H7JGMvjdDwg00lLy6L4_vxS6E1Fse8Wpu0ajV1Ic2f7LV2ZPTUfeoHt3NCts53Vdk2blk7vS1o73JiddatLclbj2purvzkkb4_la_EczV6epsVkFulYAES51hlkLFYmz3WSKKGgTlWVhH5Y54hVquNEVxASE2gyUErXKctMgDgqAUNyc7wbmrz3xndyaXvXhpeSizQHEFzwQN0eKe2s987UcuuaDbq95EweRMkgSh5EBTQ6ortmbfb_cvJhUvzyPwcfafA</recordid><startdate>201712</startdate><enddate>201712</enddate><creator>Gupta, Daya Sagar</creator><creator>Biswas, G. P.</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-5401-7287</orcidid></search><sort><creationdate>201712</creationdate><title>An ECC‐based authenticated group key exchange protocol in IBE framework</title><author>Gupta, Daya Sagar ; Biswas, G. P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2933-8cc73702be88c44b9b3f6bd4074af8aad6c24cd34af09ae73bbcf607e6bd1ab93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>authentication</topic><topic>bilinear pairing</topic><topic>Complexity</topic><topic>Cryptography</topic><topic>elliptic curve cryptography</topic><topic>Exchanging</topic><topic>group key exchange</topic><topic>Private networks</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>secure communication</topic><topic>Security</topic><topic>Virtual networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gupta, Daya Sagar</creatorcontrib><creatorcontrib>Biswas, G. P.</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gupta, Daya Sagar</au><au>Biswas, G. P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An ECC‐based authenticated group key exchange protocol in IBE framework</atitle><jtitle>International journal of communication systems</jtitle><date>2017-12</date><risdate>2017</risdate><volume>30</volume><issue>18</issue><epage>n/a</epage><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.
In this paper, we present an elliptic curve cryptography‐based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/dac.3363</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-5401-7287</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1074-5351 |
ispartof | International journal of communication systems, 2017-12, Vol.30 (18), p.n/a |
issn | 1074-5351 1099-1131 |
language | eng |
recordid | cdi_proquest_journals_1968339191 |
source | Access via Wiley Online Library |
subjects | authentication bilinear pairing Complexity Cryptography elliptic curve cryptography Exchanging group key exchange Private networks Protocol Protocol (computers) secure communication Security Virtual networks |
title | An ECC‐based authenticated group key exchange protocol in IBE framework |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T15%3A51%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20ECC%E2%80%90based%20authenticated%20group%20key%20exchange%20protocol%20in%20IBE%20framework&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Gupta,%20Daya%20Sagar&rft.date=2017-12&rft.volume=30&rft.issue=18&rft.epage=n/a&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.3363&rft_dat=%3Cproquest_cross%3E1968339191%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1968339191&rft_id=info:pmid/&rfr_iscdi=true |