Heterogeneous Tree Based Authenticated Group Key Transfer Protocol

α
A.B.SUREKHA
A.B.SUREKHA
σ
C.Shoba Bindu
C.Shoba Bindu
α Jawaharlal Nehru Technological University Anantapur Jawaharlal Nehru Technological University Anantapur

Send Message

To: Author

Heterogeneous Tree Based Authenticated Group Key Transfer Protocol

Article Fingerprint

ReserarchID

MWDCU

Heterogeneous Tree Based Authenticated Group Key Transfer Protocol Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Message passing from one source to another has become a key for many upcoming technologies. This is already achieved by introduction of topics of KEYS, AUTHENTICATIONS etc. Secret key transfer is being done presently by using mutually trusted key generation centre (KGS). By this selection of session key by which encryption is done for information passing is selected. This paper discusses about the advancement of this technology by extending this service to group instead of a single key. The whole group with authenticated users can access the information. The proposed protocol considers the heterogeneity of the peer resources as QOS factor in key generation phase and shared key mechanism as primary process to achieve security in group key sharing.

References

29 Cites in Article
  1. G Blakley (1979). Safeguarding cryptographic keys.
  2. Shimshon Berkovits (1991). How To Broadcast A Secret.
  3. R Blom (1984). An Optimal Class of Symmetric Key Generation Systems.
  4. C Blundo,A De Santis,A Herzberg,S Kutten,U Vaccaro,M Yung (1998). Perfectly Secure Key Distribution for Dynamic Conferences.
  5. Colin Boyd (1997). On key agreement and conference key agreement.
  6. E Bresson,O Chevassut,D Pointcheval,J.-J Quisquater (2001). Provably Authenticated Group Diffie-Hellman Key Exchange.
  7. J Bohli (2006). A Framework for Robust Group Key Agreement.
  8. M Burmester,Y Desmedt (1994). A Secure and Efficient Conference Key Distribution System.
  9. R Canetti,J Garay,G Itkis,D Micciancio,M Naor,B Pinkas (1999). Multicast Security: A Taxonomy and Some Efficient Constructions.
  10. Jiin-Chiou Cheng,Chi-Sung Laih (2009). Conference key agreement protocol with non-interactive fault-tolerance over broadcast network.
  11. W Diffie,M Hellman (1976). New directions in cryptography.
  12. M Eltoweissy,M Heydari,L Morales,I Sudborough (2004). Combinatorial Optimization of Group Key Management.
  13. Amos Fiat,Moni Naor (1994). Broadcast Encryption.
  14. H Harney,C Muckenhirn,T Rivers (1997). Group Key Management Protocol (GKMP) Architecture.
  15. K Huang,Y Chung,H Lee,F Lai,T Chen (2009). A Conference Key Agreement Protocol with Fault-Tolerant Capability.
  16. (2004). IEEE Standard for information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements.
  17. I Ingemarsson,D Tang,C Wong (1982). A conference key distribution system.
  18. J Katz,M Yung (2007). Scalable Protocols for Authenticated Group Key Exchange.
  19. C Lain,J Lee,L Harn (1989). A New Threshold Scheme and Its Application in Designing the Conference Key Distribution Cryptosystem.
  20. C Li,J Pieprzyk (1999). Conference Key Agreement from Secret Sharing.
  21. A Penrig,D Song,D Tygar (2001). ELK, a new protocol for efficient large-group key distribution.
  22. G Saze (2003). Generation of Key Predistribution Schemes Using Secret Sharing Schemes.
  23. Adi Shamir (1979). How to share a secret.
  24. A Sherman,D Mcgrew (2003). Key establishment in large dynamic groups using one-way function trees.
  25. D Steer,L Strawczynski,W Diffie,M Wiener (1988). A Secure Audio Teleconference System.
  26. Michael Steiner,Gene Tsudik,Michael Waidner (1996). Diffie-Hellman key distribution extended to group communication.
  27. D Stinson (2002). Cryptography Theory and Practice.
  28. W Tzeng (2002). A Secure Fault-Tolerant Conference Key Agreement Protocol.
  29. Lien Harn,Changlu Lin (2010). Authenticated Group Key Transfer Protocol Based on Secret Sharing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

A.B.SUREKHA. 1970. \u201cHeterogeneous Tree Based Authenticated Group Key Transfer Protocol\u201d. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 7): .

Download Citation

Journal Specifications
Version of record

v1.2

Issue date

April 4, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 21026
Total Downloads: 11208
2026 Trends
Related Research

Published Article

Message passing from one source to another has become a key for many upcoming technologies. This is already achieved by introduction of topics of KEYS, AUTHENTICATIONS etc. Secret key transfer is being done presently by using mutually trusted key generation centre (KGS). By this selection of session key by which encryption is done for information passing is selected. This paper discusses about the advancement of this technology by extending this service to group instead of a single key. The whole group with authenticated users can access the information. The proposed protocol considers the heterogeneity of the peer resources as QOS factor in key generation phase and shared key mechanism as primary process to achieve security in group key sharing.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Heterogeneous Tree Based Authenticated Group Key Transfer Protocol

A.B.Surekha
A.B.Surekha Jawaharlal Nehru Technological University Anantapur
C.Shoba Bindu
C.Shoba Bindu

Research Journals