By Topic

Design of efficient ternary-tree based group key agreement protocol for dynamic groups

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Sachin Tripathi ; Department of Computer Science & Engineering Indian School of Mines University, Dhanbad-826004, Jharkhand, India ; G. P. Biswas

Several groupware applications such as distributed databases, video conferences, distributed computation etc require secure transmission while communicating over open connected networks, and for which numerous group key agreement protocols for static/dynamic groups have been proposed for establishing a secret session key among the group members. This paper proposes ternary tree based new technique to establish a contributory secure group key for dynamic groups, where a ternary tree has at most three children per node. The proposed technique instead of using two-party Diffie-Hellman technique as used in most of the binary tree based group-key generation techniques, uses an existing three party key exchange technique called GDH.2 to establish a shared secret key between the participants. The method provides some advantages over the existing binary tree based technique as it reduces the number of iterations to log3N, where N is the number of participants, covers larger subgroup using broadcast messages than subgroup formed in binary tree based approaches etc. As a result, the total number of broadcast messages and the exponential operations are reduced and it becomes a communication and computation efficient group key agreement protocol. Since proposed technique is projected for dynamic groups, therefore after initialization operation, the method describes and calculates the complexity of major group key management operations like single join, mass join and mass leave. The results obtained are then compared with other efficient group key agreement protocols like CCEGK, EGK, TGDH, STR and it has been seen that proposed method in most of the cases performs well.

Published in:

2009 First International Communication Systems and Networks and Workshops

Date of Conference:

5-10 Jan. 2009