Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments
نویسندگان
چکیده
منابع مشابه
Efficient identity-based authenticated multiple key exchange protocol
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been proposed. However, the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over ...
متن کاملEfficient identity-based authenticated multiple key exchange protocol
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been proposed. However, the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over ...
متن کاملA Pairing-Free Identity-Based Authenticated Key Agreement Protocol for MANET
Providing a suitable authenticated key establishment protocol in MANETs is challenging due to all the characteristics of networks, such as communication capability, computation capability and storage resources. This paper presents an efficient and flexible authenticated key agreement protocol without bilinear pairings for MANET. Our proposed protocol not only provides mutual authentication betw...
متن کاملKnapsack Diffie-Hellman: A New Family of Diffie-Hellman
Diffie-Hellman problems have been widely involved in the design of various cryptographic protocols. Its general family is based on the discrete logarithm over a finite field. Since 2000, its another family which is based on elliptic curve discrete logarithm as well as bilinear pairing, e.g. Weil or Tate pairing, has been attracted significant studies. Thereafter, various cryptographic protocols...
متن کاملA New Efficient Authenticated ID-Based Group Key Agreement Protocol
Group key agreement (GKA) protocols Play a main role in constructing secure multicast channels. These protocols are algorithms that describe how a group of parties communicating over a public network can gain a common secret key. ID-based authenticated group key agreement (AGKA) cryptosystems based on bilinear pairings are update researching subject because of the simplicity of their public key...
متن کامل