Skip to main content
Top

2018 | OriginalPaper | Chapter

A Novel Multi-party Key Exchange Protocol

Authors : Swapnil Paliwal, Ch. Aswani Kumar

Published in: Intelligent Systems Design and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A key exchange protocols are generally used in order to exchange a cryptographic session key, such that no one except the communicating party must be able to deduce the keys lifetime. In this paper we propose a protocol which can be used for multi-party key exchange amongst the entities with less number of iterations, and also the same protocol can be used for sharing the messages amongst the entities, the key advantage of this protocol is when we are using this protocol for the multi-party key exchange as it requires very less result when compared with conventional two move Diffie-Hellman key exchange protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: EUROCRYPT 2001, pp. 451–469 (2001) Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: EUROCRYPT 2001, pp. 451–469 (2001)
2.
go back to reference Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelink, S., Zimmermann, P.: In: 2nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, pp. 1–5, October 2015 Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelink, S., Zimmermann, P.: In: 2nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, pp. 1–5, October 2015
4.
go back to reference Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26, 94–97 (2007)CrossRef Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26, 94–97 (2007)CrossRef
6.
go back to reference AL-Sammarraie, O.A., Bashir, M.A.: Generalization of Newton’s forward interpolation formula. Int. J. Sci. Res. Publ. 5(3), 1–5 (2015) AL-Sammarraie, O.A., Bashir, M.A.: Generalization of Newton’s forward interpolation formula. Int. J. Sci. Res. Publ. 5(3), 1–5 (2015)
7.
go back to reference Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2006) Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2006)
8.
go back to reference Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1(2), 69–71 (2012) Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1(2), 69–71 (2012)
9.
go back to reference Khader, A.S., Lai, D.: Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol. In: 22nd International Conference on Telecommunications (ICT 2015), pp. 204–208 (2015) Khader, A.S., Lai, D.: Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol. In: 22nd International Conference on Telecommunications (ICT 2015), pp. 204–208 (2015)
10.
go back to reference McCurley, K.S.: Proceedings of Symposia in Applied Mathematics, vol. 42, pp. 49–69, 8–9 August 1989 McCurley, K.S.: Proceedings of Symposia in Applied Mathematics, vol. 42, pp. 49–69, 8–9 August 1989
Metadata
Title
A Novel Multi-party Key Exchange Protocol
Authors
Swapnil Paliwal
Ch. Aswani Kumar
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-76348-4_58

Premium Partner