Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function
نویسندگان
چکیده
منابع مشابه
Elliptic Curve Multiset Hash
A homomorphic, or incremental, multiset hash function, associates a hash value to arbitrary collections of objects (with possible repetitions) in such a way that the hash of the union of two collections is easy to compute from the hashes of the two collections themselves: it is simply their sum under a suitable group operation. In particular, hash values of large collections can be computed inc...
متن کاملKey management system for WSNs based on hash functions and elliptic curve cryptography
Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show tha...
متن کاملThe Encrypted Elliptic Curve Hash
Bellare and Micciancio’s MuHASH applies a pre-existing hash function to map indexed message blocks into a secure group. The resulting hash is the product. Bellare and Micciancio proved, in the random oracle model, that MuHASH is collision-resistant if the group’s discrete logarithm problem is infeasible. MuHASH, however, relies on a pre-existing hash being collision resistant. In this paper, we...
متن کاملHi-KD: Hash-based hierarchical Key Distribution for Group Communication
Even though hierarchical group communication is a prominent communication model for a variety of applications, featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements, then we propose an efficient key manageme...
متن کاملAn Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network
In wireless sensor networks(WSN), because of the absence of physical protection and unattended deployment, the wireless connections are prone to different type of attacks. Hence, security is a measure concern in WSN. Moreover, the limited energy, memory and computation capability of sensor nodes, lead to difficulty in implementing security mechanisms effectively. In this paper we proposed an el...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/10039-5055