Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

α
Ch. Asha Jyothi
Ch. Asha Jyothi
σ
G. Narsimha
G. Narsimha
ρ
J. Prathap
J. Prathap
Ѡ
Gorti VNKV Subba Rao
Gorti VNKV Subba Rao
α Jawaharlal Nehru Technological University, Hyderabad

Send Message

To: Author

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

Article Fingerprint

ReserarchID

CSTNWS778AW

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need of sharing a key between the two communicating entities without the use of central trusted authority. So we present a decentralized two-party key agreement protocol using pairings and threshold cryptography ideas. Our model is based on Joux’s three-party key agreement protocol which does not authenticate the users and hence is vulnerable to man-in-the-middle attack. This model protects from man-in-the-middle attack using threshold cryptography.

References

23 Cites in Article
  1. Antoine Joux (2000). A One Round Protocol for Tripartite Diffie–Hellman.
  2. Ian Blake,Gadiel Seroussi,Nigel Smart (2005). Advances in Elliptic Curve Cryptography.
  3. S Al-Riyami,K Paterson (2003). Tripartite authenticated key agreement protocols from pairings.
  4. K Shim (2003). Cryptanalysis of Al-Riyami-Paterson's authenticated three party key agreement protocols.
  5. Paulo Barreto,Hae Kim,Ben Lynn,Michael Scott (2002). Efficient Algorithms for Pairing-Based Cryptosystems.
  6. L Chen,C Kudla (2002). Identity based authenticated key agreement protocols from pairings.
  7. M Scott (2002). Authenticated ID-based key exchange and remote log-in with insecure token and PIN number.
  8. N Smart (2002). An identity based authenticated key agreement protocol based on the Weil pairing.
  9. D Nalla (2003). ID-based tripartite key agreement with signatures.
  10. K Shim (2003). Cryptanalysis of ID-based tripartite authenticated key agreement protocols.
  11. K Shim (2003). Efficient ID-based authenticated key agreement protocol based on Weil pairing.
  12. Kyungah Shim (2003). Efficient one round tripartite authenticated key agreement protocol from Weil pairing.
  13. H.-M Sun,B.-T Hsieh (2003). Security analysis of Shim's authenticated key agreement protocols from pairings.
  14. Rana Barua,Ratna Dutta,Palash Sarkar (2003). Extending Joux’s Protocol to Multi Party Key Agreement.
  15. George-Gabriel Constantinescu,Adrian Iftene (2024). Enhancing Natural Human Interactions in AR/VR Applications.
  16. Steven Galbraith,Kenneth Paterson,Nigel Smart (2008). Pairings for cryptographers.
  17. Weiran Liu,Bo Qin,Jianwei Liu,Qianhong Wu (2014). Android PBC: a pairing based cryptography toolkit for Android platform.
  18. A Shamir (1979). How to share a secret.
  19. Carlos De,Morais Cordeiro,Dharma Prakash Agrawal (2006). AD HOC AND SENSOR NETWORKS Theory and Applications -Copyright.
  20. Noel Mccullagh,Paulo Barreto (2005). A New Two-Party Identity-Based Authenticated Key Agreement.
  21. Vnkv Subba Gorti,& Rao,Dr,Garimella Uma (2013). An Efficient Secure Message Transmission in Mobile Ad Hoc Networks using Enhanced Homomorphic Encryption Scheme -Global.
  22. Maggie Xiaoyan Cheng,Jianhua Sun,Manki Min,Ding-Zhu Du (2008). Energy-efficient broadcast and multicast routing in ad hoc wireless networks.
  23. Marko Hölbl,Tatjana Welzer,Boštjan Brumen (2012). An improved two-party identity-based authenticated key agreement protocol using pairings.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Ch. Asha Jyothi. 2015. \u201cTwo-Party Threshold Key Agreement Protocol for MANETs using Pairings\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.2
Version of record

v1.2

Issue date

July 29, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8225
Total Downloads: 2078
2026 Trends
Related Research

Published Article

In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need of sharing a key between the two communicating entities without the use of central trusted authority. So we present a decentralized two-party key agreement protocol using pairings and threshold cryptography ideas. Our model is based on Joux’s three-party key agreement protocol which does not authenticate the users and hence is vulnerable to man-in-the-middle attack. This model protects from man-in-the-middle attack using threshold cryptography.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Two-Party Threshold Key Agreement Protocol for MANETs using Pairings

Ch. Asha Jyothi
Ch. Asha Jyothi Jawaharlal Nehru Technological University, Hyderabad
G. Narsimha
G. Narsimha
J. Prathap
J. Prathap
Gorti VNKV Subba Rao
Gorti VNKV Subba Rao

Research Journals