[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tomar et al., 2012 - Google Patents

Secure session key generation technique for group communication

Tomar et al., 2012

View PDF
Document ID
3530817482301076485
Author
Tomar A
Jaidhar C
Tapaswi S
Publication year
Publication venue
International journal of information and electronics engineering

External Links

Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Similar Documents

Publication Publication Date Title
US8837738B2 (en) Methods, systems, and apparatuses for optimal group key management for secure multicast communication
US7957320B2 (en) Method for changing a group key in a group of network elements in a network system
Jiang et al. A survey of group key management
Rana et al. A comprehensive survey of cryptography key management systems
Pande et al. Survey on logical key hierarchy for secure group communication
Mukherjee et al. Scalable solutions for secure group communications
Tomar et al. Secure session key generation technique for group communication
Tomar et al. Secure Group Key Agreement with Node Authentication
Mukherjee et al. SIM-KM: Scalable infrastructure for multicast key management
Gharout et al. Key management with host mobility in dynamic groups
Alyani et al. The improvement of key management based on logical key hierarchy by implementing Diffie Hellman algorithm
Aparna et al. Key management scheme for multiple simultaneous secure group communication
Lehane et al. Ad hoc key management infrastructure
Kambourakis et al. Revisiting WiMAX MBS security
Guggemos et al. No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups
Chaudhari et al. Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model
Thomas et al. A novel decentralized group key management using attribute based encryption
Purushothama et al. Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
Damodaran et al. Group key management in wireless networks using session keys
Liu et al. Secure and efficient key distribution for collaborative applications
Mehdizadeh et al. Secure group communication scheme in wireless IPv6 networks: An experimental test-bed
Patil et al. Security Analysis of Proxy Cryptography Based Group Key Management Schemes for Dynamic and Wireless Networks Under Active Outsider Attack Model.
Ali et al. Multicast network security using quantum key distribution (QKD)
Rekha et al. Simple Hash Based Symmetric Encryption Mechanism for Dynamic Groups.
Jain et al. Group Key Management Protocols for Non-Network: A Survey