Tomar et al., 2012 - Google Patents
Secure session key generation technique for group communicationTomar et al., 2012
View PDF- Document ID
- 3530817482301076485
- Author
- Tomar A
- Jaidhar C
- Tapaswi S
- Publication year
- Publication venue
- International journal of information and electronics engineering
External Links
- 238000004891 communication 0 title abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8837738B2 (en) | Methods, systems, and apparatuses for optimal group key management for secure multicast communication | |
US7957320B2 (en) | Method for changing a group key in a group of network elements in a network system | |
Jiang et al. | A survey of group key management | |
Rana et al. | A comprehensive survey of cryptography key management systems | |
Pande et al. | Survey on logical key hierarchy for secure group communication | |
Mukherjee et al. | Scalable solutions for secure group communications | |
Tomar et al. | Secure session key generation technique for group communication | |
Tomar et al. | Secure Group Key Agreement with Node Authentication | |
Mukherjee et al. | SIM-KM: Scalable infrastructure for multicast key management | |
Gharout et al. | Key management with host mobility in dynamic groups | |
Alyani et al. | The improvement of key management based on logical key hierarchy by implementing Diffie Hellman algorithm | |
Aparna et al. | Key management scheme for multiple simultaneous secure group communication | |
Lehane et al. | Ad hoc key management infrastructure | |
Kambourakis et al. | Revisiting WiMAX MBS security | |
Guggemos et al. | No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups | |
Chaudhari et al. | Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model | |
Thomas et al. | A novel decentralized group key management using attribute based encryption | |
Purushothama et al. | Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model | |
Damodaran et al. | Group key management in wireless networks using session keys | |
Liu et al. | Secure and efficient key distribution for collaborative applications | |
Mehdizadeh et al. | Secure group communication scheme in wireless IPv6 networks: An experimental test-bed | |
Patil et al. | Security Analysis of Proxy Cryptography Based Group Key Management Schemes for Dynamic and Wireless Networks Under Active Outsider Attack Model. | |
Ali et al. | Multicast network security using quantum key distribution (QKD) | |
Rekha et al. | Simple Hash Based Symmetric Encryption Mechanism for Dynamic Groups. | |
Jain et al. | Group Key Management Protocols for Non-Network: A Survey |