• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Faculty of Engineering and Science
  • Department of Information and Communication Technology
  • Scientific Publications in Information and Communication Technology
  • View Item
  •   Home
  • Faculty of Engineering and Science
  • Department of Information and Communication Technology
  • Scientific Publications in Information and Communication Technology
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

A general framework for group authentication and key exchange protocols

Yang, Huihui; Jiao, Lei; Oleschchuk, Vladimir A.
Chapter, Peer reviewed
Thumbnail
View/Open
Yang_2014_General.pdf (369.2Kb)
URI
http://hdl.handle.net/11250/281322
Date
2014
Metadata
Show full item record
Collections
  • Scientific Publications in Information and Communication Technology [782]
Original version
Yang, H., Jiao, L., & Oleshchuk, V. A. (2014). A general framework for group authentication and key exchange protocols Foundations and Practice of Security (Vol. 8352 LNCS, pp. 31-45): Springer.   10.1007/978-3-319-05302-8_3
Abstract
In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward security. There are two types of protocols in our framework. The main difference between them is that the authenticator in Type II has a certificate while in Type I does not. Under the general framework, we also give the details of protocols based on Diffie-Hellman key exchange system, and discrete logarithm problem (DLP) or elliptic curve discrete logarithm problem (ECDLP) based ElGamal encryption respectively. Session keys will be established at the end of each session and they can be utilized later to protect messages transmitted on the communication channel.
Description
Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3
Series
Lecture Notes in Computer Science;8352

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit