44
Views
3
CrossRef citations to date
0
Altmetric
Articles

Design of group key agreement protocol using neural key synchronization

, &
 

Abstract

Security is considered as an important anxiety for applications which involve communication (more than two) over public networks. Group key management is one of the essential building blocks in securing group communication. Most of the researches in group key management are based on the general idea of the original Diffie–Hellman (DH) key agreement protocol. The major drawback of generalized DH for multi-party is the fact that there are expensive exponential operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to operations to be carried out. The factors that influence the capability of a Group Key agreement (GKA) protocol are communication rounds and the computational cost. In this paper, the concept of neural cryptography, based on the mutual learning of Tree Parity Machine (TPM), is extended to obtain a group key. The group key has been generated for an interactive conference key agreement system, where the system authenticates the users and allows them to compute their own session key, and also it has been recognized that the neural network based GKA protocols achieve key freshness and key secrecy. The quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.

Subject Classification:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.