A novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman

Hong Tang, Liehuang Zhu*, Zijian Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Group key agreement protocol allows all the members to agree upon a common session key, which may be used for later secure communication among all the participants. Since TGDH (tree based Diffie-Hellman) has been proposed by Yongdae Kim, Adrian Perrig, and Gene Tsudik, there are several group key agreement protocols proposed to improve the performance of TGDH. In this paper, we propose a novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman (AECTGDH), and analyze the performance of our protocol Through using MQV ECDH to compute the key of a node who has at least one child node, AECTGDH provides implicit key authentication, which TGDH cannot provide. Through substituting ellipse curve DH for DH, AECTGDH are more efficient both in term of computation and communication.

Original languageEnglish
Title of host publication2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008 - Dalian, China
Duration: 12 Oct 200814 Oct 2008

Publication series

Name2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008

Conference

Conference2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
Country/TerritoryChina
CityDalian
Period12/10/0814/10/08

Keywords

  • Elliptic curve cryptography
  • Group communication
  • Key agreement
  • MQV ECDH

Fingerprint

Dive into the research topics of 'A novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman'. Together they form a unique fingerprint.

Cite this