Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Efficient Identity-Based Conference Key Distribution Protocols
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Hi-index | 0.00 |
Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malicious insiders etc. In this paper, we propose a novel authenticated group key agreement protocol for end-to-end security in the MANET environment without any infrastructure that is based on Burmester and Desmedt group key agreement protocol (Burmester M, Desmedt Y. A secure and efficient conference key distribution system. Advances in Cryptology - EuroCrypt '94, Lecture Notes in Computer Science 1995;950:275-86) and their variants (Choi KY, Hwang JY, Lee DH. Efficient ID-based group key agreement with bilinear maps. Public Key Cryptography - PKC, Lecture Notes in Computer 2004;2947:130-144)]. We also design practical enhancements of BD and Choi et al.'s protocols that not only detect, but also identify malicious insiders by using the trusted arbiter who only involves in the protocol if the cheating has been occurred.