An Improved Efficient Fault-Tolerant Group Key Agreement Protocol
Article Details
Pub. Date
:
Mar, 2015
Product Name
:
The IUP Journal of Information Technology
Product Type
:
Article
Product Code
:
IJIT11503
Author Name
:
Indu Bala Thingom and Bubu Bhuyan
Availability
:
YES
Subject/Domain
:
Science and
Technology
Download Format
:
PDF Format
No. of Pages
:
9
Price
For delivery in electronic
format: Rs. 50;
For delivery through courier (within India): Rs.
50 + Rs. 25 for Shipping & Handling Charges
Download
To download this Article click on the button below:
Abstract
In order to ensure secure communication between communicating entities, a secret session key needs to be shared between these entities. This avoids any adversary from intruding and hijacking the communication. An authenticated group key agreement protocol is generally designed to accommodate the need of a group of specific entities in communicating over an open network with a shared secret key, which is used to preserve data confidentiality and integrity. A fault-tolerant group key agreement protocol establishes a shared key among participants of a group even when some malicious participants disrupt key agreement processes. Most of the existing group key agreement protocols operate only when all participants are honest, but do not work when some participants are malicious and attempt to destruct the key agreement processes. In 2013, Anmin Fu, Gongxuan Zhang and Zhenchao Zhu proposed a secure and efficient fault-tolerant group key agreement protocol, which is resistant to different key attack and the message tampering attack according to the security analysis. In this paper, we have proposed an improved version of this protocol which proves to be more efficient in terms of computational cost.
Description
Key agreement is a procedure of creating a secure environment between communicating
parties. Sharing a secret key will avoid an adversary from intruding the communication
as this key will be known only to the participating entities. A key agreement protocol
is said to be authenticated if the protocol is able to ensure that the session key is
known only to the intended entities in a protocol run. The first key agreement scheme
between two entities was developed by Diffie and Hellman (1976). But this Diffie-
Hellman protocol suffers from the man-in-the-middle attack because there is no mutual
authentication between the communicating entities. For secure communication
between a group of people, a common secret key known only to the members in the
group needs to be established so that messages can be encrypted using the secret key and passed among them without intervention from an outsider. The process of
establishing a common secret key known only to the members in a group is called
group key management. The goal of group key management is to set up and maintain
a shared secret key among the group members.
Keywords
Information Technology Journal, Fault-tolerant, Group key agreement, Different key attack, Message tampering attack, Fault-Tolerant, Key Agreement Protocol .