2011
DOI: 10.1186/1687-1499-2011-12
|View full text |Cite
|
Sign up to set email alerts
|

Two-round contributory group key exchange protocol for wireless network environments

Abstract: With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A group key exchange (GKE) protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group communication over a public network channel. However, most of the previously proposed GKE protocols deployed in wired networks are not fully suitable for w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…As shown in Table , although the AGKA protocols in cannot provide implicit key authentication, each low‐power node needs higher cost of computation than the proposed AGKA protocol. In the AGKA protocols in , each low‐power node requires higher time cost.…”
Section: Security and Performance Analysis On The Proposed Identity‐bmentioning
confidence: 99%
See 4 more Smart Citations
“…As shown in Table , although the AGKA protocols in cannot provide implicit key authentication, each low‐power node needs higher cost of computation than the proposed AGKA protocol. In the AGKA protocols in , each low‐power node requires higher time cost.…”
Section: Security and Performance Analysis On The Proposed Identity‐bmentioning
confidence: 99%
“…We analyze the performance of the proposed ID-AGKA protocol in terms of the security property and efficiency. We make the security property and performance comparison with the previous AGKA protocols for imbalanced mobile networks [7,10,13,14,11]. The ID-AGKA protocols consist of five phases: setup phase, key extraction phase, key agreement phase, remove phase, and join phase.…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations