A N Efficient Key Exchange Protocol Based on Secret Sharing
نویسندگان
چکیده
Group key protocols are still an important research issue in the network security, generation and sharing the secret session key is the important factor during the the groupkey transfer protocols. Usually it will be taken care of KGC. KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key but unauthorized users can not recover the groupkey.In this proposed mechanism shows More security levels In case of confidentiality and authentication than the traditional group key protocols can be analyzed in detail.
منابع مشابه
An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملAn Efficient Password-based Group Key Exchange Protocol Using Secret Sharing
In this paper, a novel and efficent password based group key exchange protocol with secret sharing is proposed. Secret sharing technology is usually used to control the privileges of the authorized users to improve the robustness of the system in past years. The results are applied into designing the key exchange protocol directly, which clarify the proposed scheme. The security analysis shows ...
متن کاملEfficient group Diffie-Hellman key agreement protocols
In a group Diffie–Hellman (GDH) key agreement protocol, all group members collaboratively establish a group key. Most GDH key agreement protocols took natural generalization of the original Diffie–Hellman (DH) key agreement protocol to arrange all group members in a logic ring or a binary tree and to exchange DH public keys. The computational cost and the communication rounds are the two most i...
متن کاملA Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing
The most common method to achieve security in multi-party communication is to provide a session key to encrypt messages transmitted among the parties. A three-party authenticated key exchange (3PAKE) protocol can allow two clients to authenticate each other’s validity and establish a common session key with the help of a trusted server. In recent years, many 3PAKE protocols have been proposed i...
متن کاملCryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing
Yuan et al. recently introduced a password-based group key transfer protocol that uses secret sharing, which they claim to be efficient and secure [9]. We remark its resemblance to the construction of Harn and Lin [1], which Nam et al. proved vulnerable to a replay attack [3]. It is straightforward that the same attack can be mount against Yuan et al.’s protocol, proving that the authors’ claim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012