Simple and Efficient Group Key Distribution Protocol using Matrices
نویسندگان
چکیده
Group Key Distribution (GKD) protocols are designed to distribute a group key several users for establishing secure communication over public network. The central trusted authority, called the distribution center (KDC) is in charge of distributing keys. For securing communication, all share common secret advance with KDC. In this paper, we propose and efficient Authenticated (GAKD) protocol based on simple idea encryption matrix rings. protocol, each user registers private KDC, while other information can be transferred publicly. scheme also supports authentication keys without assuming computational hard problems such as Integer Factorization Problem (IFP).The analysis our GAKD shows that proposed resistant reply, passive impersonation attacks. Our construction leads secure, cost computation- effective protocol.
منابع مشابه
ELK, A New Protocol for Efficient Large-Group Key Distribution
Secure media broadcast over the Internet poses unique security challenges. One problem access control to a large number of subscribers in a public broadcast. A common solution is to encrypt the broadcast data and to disclose the decryption key to legitimate receivers only. However, how do we securely and efficiently establish a shared secret among the legitimate receivers? And most importantly,...
متن کاملAn Efficient Group Key Transport Protocol
Conditional access system offers different services to the many groups simultaneously. The broadcast contents are scrambled with the secret key that protects it from unauthorized users. The secret key is distributed by server to the authorized users and shared it between user and server. The key transport protocol is used to transfer the secret key securely to these users. In this paper we pres...
متن کاملAn Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs
Key management in the ad hoc network is a challenging issue concerning the security of the group communication. Group key management protocols can be approximately categorized into three: centralized, decentralized, and distributed. The much apt solution to provide the services like authentication, data integrity and data confidentiality is the establishment of a key management protocol. This p...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملDiffie-Hellman Technique Extended to Efficient and Simpler Group Key Distribution Protocol
Ever since 2-party Diffie-Hellman exchange was first proposed in 1976, there have been efforts to extend its simplicity and elegance to a group setting. Notable solutions have been proposed by michael Steiner Gene Tsudik Waidner(in 1996) and Recently G.P.Biswas was proposed a contributory group key agreement protocol for generation of multiparty key and compared with other protocol and satisfac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Defence Science Journal
سال: 2022
ISSN: ['0011-748X', '0976-464X']
DOI: https://doi.org/10.14429/dsj.72.17461