2019
DOI: 10.1109/access.2019.2926404
|View full text |Cite
|
Sign up to set email alerts
|

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication

Abstract: Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of information) are key issues to be solved in group key agreement. Aiming at these problems, this paper proposes a group key agreement protocol based on privacy protection and attribute authentication (GKA-PPAA). The protocol proposes identity authentication for hidden attri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 51 publications
0
2
0
2
Order By: Relevance
“…In the past few years, cloud computing technology has risen up tremendously and [12] presented out the qualities of distributed storage innovation and dissected the progressive structure and the information stockpiling structure of the distributed storage administration and finally, accentuated completely on adaptability and reliability of the distributed storage administration design attributes for upcoming future. In accordance with [13], clusters of honest nodes were considered with an objective to generate a shared secret key by means of a state‐dependent wireless broadcasting channel. Also, development of a theoretical information to secure secret key agreement protocol is proposed which showed the optimality of this protocol [18] over a hybrid cloud service with respect to different calibrations of 5G network based scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…In the past few years, cloud computing technology has risen up tremendously and [12] presented out the qualities of distributed storage innovation and dissected the progressive structure and the information stockpiling structure of the distributed storage administration and finally, accentuated completely on adaptability and reliability of the distributed storage administration design attributes for upcoming future. In accordance with [13], clusters of honest nodes were considered with an objective to generate a shared secret key by means of a state‐dependent wireless broadcasting channel. Also, development of a theoretical information to secure secret key agreement protocol is proposed which showed the optimality of this protocol [18] over a hybrid cloud service with respect to different calibrations of 5G network based scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Предполагается, что нарушитель использует пассивную стратегию [2,10]. Особенности активного нарушителя показаны в [11,12]. После передачи информации ОС обладают некоторой информацией в виде последовательностей на входе ДШКБП и двух его выходах в виде кодового слова x̅ , x̅ ∈ V для ОС А и принятых последовательностей y̅ , y̅ ∈ Y n для ОС В и m̅ , m̅ ∈ M n для ОС С. Эти последовательности могут быть коррелированы между собой [13], а также с начальными данными нарушителя в виде последовательности z̅ , z̅ ∈ Z n .…”
Section: удк 621 391 безопасность мета-сети интернетunclassified
“…В предыдущих исследованиях [1] показано, что в условиях одновременной передачи информации одновременно по составляющим каналам дискретного широковещательного канала связи без памяти (ДШКБП), может быть затрачено меньше времени на передачу, чем при поочередной передаче информации по каждому составляющему каналу ДШКБП. Этот факт определяет возможный выигрыш по времени формирования сетевого ключа (СК) объектов связи (ОС) на основе открытого сетевого ключевого согласования [2,3]. Поэтому в работе предлагается терминология и метод оценки асимптотической эффективности открытого сетевого ключевого согласования, который позволит обоснованно выбирать преимущественные условия осуществления формирования СК по открытым каналам сети связи, обеспечивающие оперативное восстановление сетевой криптосвязности.…”
Section: Introductionunclassified
“…Network security has a long history of research and many sensing technologies have been developed. However, many attack technologies are emerging, including white box attacks, gray box attacks, black box attacks, and improvements to these attacks [15]- [18]. In addition, there are many models and emerging technologies that apply to network security [19]- [23].…”
Section: Related Workmentioning
confidence: 99%