Skip to main content

Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 339))

Abstract

Secure group communication is an important research issue in the field of cryptography and network security, because group applications like online chatting programs, video conferencing, distributed database, online games etc. are expanding rapidly. Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. The design of secure group communication can be very critical for achieving security goals. Many group key agreement protocols such as Tree-based Group Diffie-Hellman (TGDH) Kim et al. (ACM Trans Inf Syst Secur (TISSEC) 7(1):60–96, (2004)) [1], Group Diffie-Hellman (GDH) Steiner et al. (IEEE Trans Parallel Distrib Syst 11(8):769–780, (2000)) [2], Skinny Tree (STR) Wong et al. (IEEE/ACM Trans Netw 8(1):16–30, (2000)) [3] etc., have been established for secure group communication, but they have suffered from unnecessary delays as well as their communication cost increased due to increased exponentiation. An alternative approach to group key agreement is the queue based group key agreement protocol that reduces unnecessary delays, considers member diversity with filtering out low performance members in group key generation processes. We propose a novel queue based group key agreement protocol that uses the concepts of elliptic curve cryptography. The proposed protocol gives better results than the other existing related protocols and it also reduces computational overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, Y., Perring. A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. (TISSEC). 7(1), 60–96 (2004)

    Google Scholar 

  2. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11(8), 769–780 (2000)

    Google Scholar 

  3. Wong, C., Gouda, M., Lam, S.: Secure group communication using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30. (2000)

    Google Scholar 

  4. Amir, Y., Kim, Y., Rotaru, C.N., Tsudik, G.: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. (TISSEC). 7(3), 457–488 (2004)

    Google Scholar 

  5. Hong, S.: Queue based group key agreement protocol. Int. J. Netw. Secur. 9(2), 135–142 (2009)

    Google Scholar 

  6. Diffie, W., Hellman, M. E.: New directions in cryptography. IEEE Tran. Inf. Theor. IT 22(6), 644–654 (1976)

    Google Scholar 

  7. Hong, S., Benitez, N.L.: Enhanced group key computation protocol. In: International Conference on Security and Management-SAM’06. Las Vegas, USA, 26–29 June 2006

    Google Scholar 

  8. Hsu, C.F., Cui, G.H., Cheng, Q., Chen, J.: A novel linear multi-secret sharing scheme for group communication in wireless mesh networks. J. Netw. Comput. Appl. 34(2), 464–468 (2011)

    Google Scholar 

  9. Bohli, J.M.: A framework for robust group key agreement. Comput. Sci. Appl. ICCSA, 355–364 (2006)

    Google Scholar 

  10. Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: Advances in cryptology–Eurocrypt’94, pp. 275–286. Springer, Berlin (1994)

    Google Scholar 

Download references

Acknowledgment

This work is supported by UGC (University Grant Commission), Govt. of India under project No.—UGC(77)/2012-13/316/CSE. We would like to thank UGC for the support in this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Jaiswal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Jaiswal, P., Kumar, A., Tripathi, S. (2015). Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2250-7_17

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2249-1

  • Online ISBN: 978-81-322-2250-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics