T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity
نویسندگان
چکیده
منابع مشابه
A Scalable and Effective Architecture for Grid Services’ Discovery
This paper presents Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Services discovery based on VDHA has scalable, autonomous, efficient, reliable, quick responsive, and fully. We propose two service discovery algorithms. Full Search Query and Discovery Protocol (FSQDP) discovers the nodes that match the request message from all N nodes,...
متن کاملA Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity
Group key establishment is one of the basic building blocks in securing group communication. In this paper, motivated by Desmedt's BD-II protocol, we propose a secure ID-Based group key establishment protocol which has a constant number of rounds and requires only (log ) O n computation and communication. Our scheme achieves key negotiate by scalar multiplication other than using pairing comput...
متن کاملScalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force group for some project needs to be built. This order is passed down the hierarchy where it finally reaches a manager who calls some employees to form a group. The members should communicate in a secure way and for eff...
متن کاملDesign of RFID Security Authentication Protocol for E-Commerce Service
As for security of RFID network, this paper has proposed a safe, effective and scalable RFID Authentication Protocol (CRFID) with cloud database as server. Firstly, the tree-structure management tag is used to achieve privacy protection, and the time complexity of RFID system in search of cloud database is reduced from O (N) to O (logN); then, the size of each subkey in keys route of the RFID t...
متن کاملScalable Group Key Exchange for Securing Distributed Operating Systems
Distributed operating systems are designed to run over a collection of computing nodes that are spatially disseminated and communicate through a computer network. The computing nodes interact collaboratively with each other in order to pursue a common purpose. Protecting group communication between the collaborating nodes against potential attacks is one of the major challenges faced by the des...
متن کامل