tailieunhanh - Báo cáo hóa học: " Two-round contributory group key exchange protocol for wireless network environments"

Two-round contributory group key exchange protocol for wireless network environments | Wu et al. EURASIP Journal on Wireless Communications and Networking 2011 2011 12 http content 2011 1 12 o EURASIP Journal on Wireless Communications and Networking a SpringerOpen Journal RESEARCH Open Access Two-round contributory group key exchange protocol for wireless network environments Tsu-Yang Wu Yuh-Min Tseng and Ching-Wen Yu Abstract With the popularity of group-oriented applications secure group communication has recently received much attention from cryptographic researchers. A group key exchange GKE protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence GKE protocols can be used to provide secure group communication over a public network channel. However most of the previously proposed GKE protocols deployed in wired networks are not fully suitable for wireless network environments with low-power computing devices. Subsequently several GKE protocols suitable for mobile or wireless networks have been proposed. In this article we will propose a more efficient group key exchange protocol with dynamic joining and leaving. Under the decision Diffie-Hellman DDH the computation Diffie-Hellman CDH and the hash function assumptions we demonstrate that the proposed protocol is secure against passive attack and provides forward backward secrecy for dynamic member joining leaving. As compared with the recently proposed GKE protocols our protocol provides better performance in terms of computational cost round number and communication cost. Keywords Group key exchange Dynamic Wireless network Diffie-Hellman assumption Introduction Wireless communication technology has widely been applied to many mobile applications and services such as e-commerce applications mobile access services and wireless Internet services. Nowadays people use their cellular phone or PDA personal digital assistant to access these mobile services. However most of such security schemes and .

TÀI LIỆU LIÊN QUAN