Skip to main content
Log in

Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

In today’s world, security is the main issue in all type of communication systems. Secure group communication is that where some members out of ‘n’, have the privilege to access the data of a particular group. The non interactive key computation for secure communication in dynamic groups is a main challenging issue. In the dynamic groups, the group size is not fixed, as the members may leave or join the group anytime. The non interactivity of the group communication says that there will not be any exchange of the keys among the group members. In this paper, we proposed a polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. In the proposed protocol, the polynomial is constructed in such a way that it may be used as a generalized polynomial for ‘n’ members and may be reformed every time by the server whenever there is any change in the group membership. In addition, the security of the polynomial session key depends on the value of coefficients of the variables in polynomial. In comparison with various existing protocols our proposed protocol is efficient in terms of computation, storage and communication complexities. The graphical results shows that the no. of rounds, no. of messages passed and total no. of exponentiations are completely reduced in our protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  2. Kalaiselvi S, JabeenBegum S (2008) A secure group communication using non-interactive key computation in multiparty key agreement. In: International conference on computing, communication and networking, 2008. ICCCn 2008. IEEE, New York, pp 1–6

  3. Steiner M, Tsudik G, Waidner M (1996) Diffie–Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security. ACM, New York, pp 31–37

  4. Kumar CK, Jose GJA, Sajeev C, Suyambulingom C (2006) Safety measures against man-in-the-middle attack in key exchange. ARPN J Eng Appl Sci 7(2):243–246

    Google Scholar 

  5. Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1998) Perfectly secure key distribution for dynamic conferences. Inf Comput 146(1):1–23

    Article  MathSciNet  Google Scholar 

  6. Geetha BT, Srinath MV, Perumal V (2014) Group communication using a dynamic key generation protocol. Int J Adv Res Comp Sci Manag Stud 2(6):1–7

    Google Scholar 

  7. Ingemarsson I, Tang D, Wong C (1982) A conference key distribution system. IEEE Trans Inf Theory 28(5):714–720

    Article  MathSciNet  Google Scholar 

  8. Lv C, Ma M, Li H, Ma J, Zhang Y (2013) An novel three-party authenticated key exchange protocol using one-time key. J Netw Comput Appl 36(1):498–503

    Article  Google Scholar 

  9. Tomar AS, Jaidhar CD, Tapaswi S (2012) Secure session key generation technique for group communication. Int J Inf Electron Eng 2(5):831

    Google Scholar 

  10. Aparna R, Amberker BB (2008) Authenticated secure group communication using broadcast encryption key computation. In: Fifth international conference on information technology: new generations, 2008. ITNG 2008. IEEE, New York, pp 348–353

  11. Burmester M, Desmedt Y (1994) A secure and efficient conference key distribution system. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, pp 275–286

    Chapter  Google Scholar 

  12. Aparna R, Amberker BB (2007) Dynamic authenticated secure group communication. World Acad Sci Eng Technol 34:359–362

    Google Scholar 

  13. Okamoto E, Tanaka K (1989) Key distribution system based on identification information. IEEE J Sel Areas Commun 7(4):481–485

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinod Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Kumar, R. & Pandey, S.K. Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int. j. inf. tecnol. 12, 283–288 (2020). https://doi.org/10.1007/s41870-018-0140-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0140-1

Keywords

Navigation