期刊文献+

A dynamic,secure,and efficient group key agreement protocol 被引量:1

原文传递
导出
摘要 The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.
出处 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期182-185,共4页 中国电气与电子工程前沿(英文版)
基金 supported by the National Natural Science Foundation of China(Grant No.90304009).
  • 相关文献

同被引文献31

  • 1Rafaeli S, Hutchison D. A survey of key management for secure group communication [J]. ACM Computing Surveys, 2003, 35(3): 309-329.
  • 2Zhao Xingwen, Zhang Fangguo, Tian Haibo. Dynamic asymmetric group key agreement for ad hoc networks [J]. Ad Hoc Networks, 2011, 9(5): 928-939.
  • 3Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895- 2903.
  • 4Chang Tingyi, Hwang Minshiang, Yang Weipang. A communication efficient three-party password authenticated key exchange protocol [J]. Information Sciences, 2011, 181 (1): 217-226.
  • 5Guo Hua, Li Zhoujun, Mu Yi, et al. Provably secure identity based authenticated key agreement protocols with malicious private key generators [J]. Information Sciences, 2011, 181(3):628-647.
  • 6Zhang L, Zhang F, Wu Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6): 1020-1030.
  • 7Just M, Vaudenay S. Authenticated multi-party key agreement [G] //LNCS 1163: Proc of the 1996 Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 1996: 36-49.
  • 8Burmester M, Desmedt Y. A secure and scalable group key exchange system [J]. Information Processing Letters, 2005, 94(3): 137-143.
  • 9Bohli JM, Glas B, Steinwandt R. Towards provably secure group key agreement building on group theory [G] //LNCS 4341: Proc of Cryptology-VIETCRYPT. Berlin: Springer, 2006:322-336.
  • 10Yao Gang, Wang Hongii, Jiang Qingshan. An authenticated 3-Round identity based group key agreement protocol [C]//Proc of the 3rd Int Conf on Availability, Reliability, and Security. Piscataway, NJ: IEEE, 2008: 538-543.

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部