Abstract
In today’s world, security is the main issue in all type of communication systems. Secure group communication is that where some members out of ‘n’, have the privilege to access the data of a particular group. The non interactive key computation for secure communication in dynamic groups is a main challenging issue. In the dynamic groups, the group size is not fixed, as the members may leave or join the group anytime. The non interactivity of the group communication says that there will not be any exchange of the keys among the group members. In this paper, we proposed a polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. In the proposed protocol, the polynomial is constructed in such a way that it may be used as a generalized polynomial for ‘n’ members and may be reformed every time by the server whenever there is any change in the group membership. In addition, the security of the polynomial session key depends on the value of coefficients of the variables in polynomial. In comparison with various existing protocols our proposed protocol is efficient in terms of computation, storage and communication complexities. The graphical results shows that the no. of rounds, no. of messages passed and total no. of exponentiations are completely reduced in our protocol.
Similar content being viewed by others
References
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Kalaiselvi S, JabeenBegum S (2008) A secure group communication using non-interactive key computation in multiparty key agreement. In: International conference on computing, communication and networking, 2008. ICCCn 2008. IEEE, New York, pp 1–6
Steiner M, Tsudik G, Waidner M (1996) Diffie–Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security. ACM, New York, pp 31–37
Kumar CK, Jose GJA, Sajeev C, Suyambulingom C (2006) Safety measures against man-in-the-middle attack in key exchange. ARPN J Eng Appl Sci 7(2):243–246
Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1998) Perfectly secure key distribution for dynamic conferences. Inf Comput 146(1):1–23
Geetha BT, Srinath MV, Perumal V (2014) Group communication using a dynamic key generation protocol. Int J Adv Res Comp Sci Manag Stud 2(6):1–7
Ingemarsson I, Tang D, Wong C (1982) A conference key distribution system. IEEE Trans Inf Theory 28(5):714–720
Lv C, Ma M, Li H, Ma J, Zhang Y (2013) An novel three-party authenticated key exchange protocol using one-time key. J Netw Comput Appl 36(1):498–503
Tomar AS, Jaidhar CD, Tapaswi S (2012) Secure session key generation technique for group communication. Int J Inf Electron Eng 2(5):831
Aparna R, Amberker BB (2008) Authenticated secure group communication using broadcast encryption key computation. In: Fifth international conference on information technology: new generations, 2008. ITNG 2008. IEEE, New York, pp 348–353
Burmester M, Desmedt Y (1994) A secure and efficient conference key distribution system. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, pp 275–286
Aparna R, Amberker BB (2007) Dynamic authenticated secure group communication. World Acad Sci Eng Technol 34:359–362
Okamoto E, Tanaka K (1989) Key distribution system based on identification information. IEEE J Sel Areas Commun 7(4):481–485
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, V., Kumar, R. & Pandey, S.K. Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int. j. inf. tecnol. 12, 283–288 (2020). https://doi.org/10.1007/s41870-018-0140-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-018-0140-1