44
Views
3
CrossRef citations to date
0
Altmetric
Articles

Design of group key agreement protocol using neural key synchronization

, &

References

  • Bibo Jiang , Xiulin Hu , “A Survey of Group Key Management“, International Conference on Computer Science and Software Engineering, IEEE Computer Society, 2008 pp 994-1002.
  • Fiat. A. and Naor. M. : ‘Broadcast encryption’. In D.R. Stinson, editor, Advances in cryptology-CRYPf0’93, ‘ Lecture Notes in Computer Science No. 773 (Springer, 1994), pp. 480-491.
  • C. Blundo , A. De Santis , A. Herzberg , S. Kutten , U. Vaccaro , M. Yung , “Perfectly Secure Key Distribution for Dynamic Conferences“. In Advances in Cryptology-CRYPTO’92, LNCS, 740 (1993), pp.471–486.
  • Y. Amir , Y. Kim , C. Nita-Rotaru , J. Schultz , J. Stanton , G. Tsudik , “ Secure Group Communication using Robust Contributory Key Agreement “. IEEE Transactions on Parallel and Distributed Systems, 15, 5, 2004, pp. 468–480. doi: 10.1109/TPDS.2004.1278104
  • Wallner, D. , Harder, E. , Agee, R , 1999 “Key Management for multicast: Issues and Architectures“, RFC 2627.
  • Wong, C. K. , Gouda, M. G. , Lam, S.S. 2000, “ Secure group communications using key graphs “, Transactions on Networking 8, 1, 16-30. doi: 10.1109/90.836475
  • Caronni, G. , Waldvogel, M. , Sun, D. , Weiler, N. , Platiner, B , 1999. “The Versakey framework: Versatile group key management“, IEEE journal of Selected areas in Communication 17, 9.
  • Y. Amir , Y. Kim , C. Nita-Rotaru , G. Tsudik , “ On the Performance of Group Key Agreement Protocols “. ACM Transactions on Information and System Security (TISSEC) Volume 7 Issue 3, 2004, pp 457-488. doi: 10.1145/1015040.1015045
  • Ingemarsson, I. , Tang, D. , and Wong, C. : “A conference key distribution system“, IEEE Trans., 1982, pp. 714-720.
  • Michael Steiner , Gene Tsudik, Michael Waidner, “Diffie-Hellman key distribution extended to group communication“, 3rd ACM Conference on Computer and Communications Security ACM press 1996, PP 31-37.
  • Michael Steiner , Gene Tsudik , Michael Waidner , “Key Agreement in Dynamic Peer Groups“. IEEE Transactions on parallel and Distribyted Systems, 11(8) 769-780, August 2000.
  • Kumar, Ankit , et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography , 22.4, pp: 499-507, 2019.
  • Gwoboa Horng , “ An Efficient and Secure Protocol for multi-party key establishment “, The computer Journal , 44(5):463-470, 2001. doi: 10.1093/comjnl/44.5.463
  • Adrain Perrig , “Efficient Collaborative key management protocols for secure autonomous group communication“ , International workshop on Cryptographic Techniques and Electronic Commerce, University of Hong Kong Press, 192-202, 1999.
  • Yongdae Kim , Adrain Perrig , Gene Tsudik , “Simple and Fault Tolerant Key agreement for Dynamic Collaborative groups.”, 7th ACM Conference on Computer and Communications Security ACM press 2000, PP 235-244.
  • Wu Q , Mu Y , Susilo W , Qin B , Domingo-Ferrer J. “Asymmetric group key agreement“. In: Proc of Eurocrypt ‘09, LNCS, and vol. 5479; 2009. p. 153–70.
  • Zhang L , Wu Q , Qin B , Domingo-Ferrer J. “Provably secure one-round identity-based authenticated asymmetric group key agreement protocol“.Inf Sci2011;181(19):4318–29.
  • Gu X , Zhao Y , Yang J. “ Reducing rekeying time using an integrated group key agreement scheme “. J Commun Netw 2012;14(4):418–428. doi: 10.1109/JCN.2012.6292248
  • Konstantinou E. “An efficient constant round ID-based group key agreement protocol for Ad hoc networks“. In: Proc of NSS 2013, LNCS, vol. 7873; 2013.PP. 563–574.
  • Jarecki S , Kim J , Tsudik G. “ Flexible robust group key agreement .” IEEE Trans Parallel DistribSyst 2011; 22(5):879–886. doi: 10.1109/TPDS.2010.128
  • Colin boyd , Anish Mathuria , “Protocols for Authentication and Key Establishment“, Springer Books, 2013.
  • Antoine Joux , “A one round Protocol for Tripartite Diffie –Hellman“, Algorithmic Number theory, 4th International Symposium, ANTS-IV< pp 385-393, Springer verlag, 2000 LNCS volume 1838.
  • I. Kanter , W. Kinzel , E. Kanter , “ Secure Exchange of Information by Synchronization of Neural Networks “, Europhys Lett 57, 2002 PP 141-147. doi: 10.1209/epl/i2002-00552-9
  • S. Santhanalakshmi , TSB Sudarshan , G K Patra , “Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation“, Recent Trends In Computer Networks and Distributed System CCIS Volume 335, Springer-Verlag, 2012. PP 422-430.
  • Thomas Hardjono , Gene Tsudik , “ IP multicast Security;Issues and directions “, Annales de Telecom, pp324-340, July-August 2000.
  • S. Santhanalakshmi , Sangeeta K , G K Patra , “Analysis of Neural synchronization using Genetic Approach for Secure Key generation“, Security in Computing and Communications, SSCC , CCIS Volume 536, Springer-Verlag 2015. PP 207–216.
  • Y Kim , Adrain Perrig , G Tsudik , “Simple and Fault-Tolerant key agreement for dynamic collaborative groups“. 7th ACM Conference on Computer and Communications Security. PP 235-244, 2000.
  • S. Santhanalakshmi , Sangeeta K , G K Patra , “ Design of Secure Cryptographic Hash Function using Soft Computing Techniques “, Intl. J.ofAdv in Soft computing and its Applications, 2017. PP 188–203.
  • Mukundan P M , Manayankath S , Srinivasan C , Sethumadhavan M , “ Hash-One:A lightweight cryptographic hash function“, IET Information Security 10(5), PP 225-231, 2016. doi: 10.1049/iet-ifs.2015.0385

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.