Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware
IEEE Transactions on Computers
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
Proceedings of the 2005 ACM symposium on Applied computing
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants
The Computer Journal
Compact modular exponentiation accelerator for modern FPGA devices
Computers and Electrical Engineering
Robust Two-Party Password Based Authenticated Key Agreement Protocol
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
Ad Hoc Networking
An improved Authentication and Key Agreement Protocol of 3G
ETCS '09 Proceedings of the 2009 First International Workshop on Education Technology and Computer Science - Volume 02
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
IEEE Communications Magazine
Key agreement in ad hoc networks
Computer Communications
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Owing to the popularity of wireless networks, the group key agreement (GKA) design is critical for providing secure group communications over an insecure wireless channel. In 2005, Nam et al. proposed a GKA protocol for imbalanced wireless networks in which an imbalanced wireless network consists of many mobile nodes with limited computing capability and a powerful node with less restriction. In 2007, Tseng showed that Nam et al.'s protocol is not a contributory GKA, while he also proposed a new GKA protocol. However, neither GKA protocol is concerned with dynamic member joining/leaving. This is an important functionality of GKA, especially for a wireless network environment. In this paper, we propose a dynamic group key agreement protocol for imbalanced wireless networks, and show that it requires less computation cost for dynamic member joining/leaving as compared to the previously proposed protocols. We also show that the proposed protocol is provably secure against passive attacks under the decision Diffie-Hellman problem and the hash function assumptions. Furthermore, by the pre-shared two-party key between a mobile node and the powerful node in the existing imbalanced wireless networks, we propose a generalized GKA protocol that requires only several hash functions.