Font Size: a A A

An Password-based Authenticated Group-Key Exchange Protocol And Implement

Posted on:2009-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y E JinFull Text:PDF
GTID:2178360272970274Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the increasing complex of the network, the various applications of the group communication in the open network environment appear, that demand the security performance of the network environment higher and higher. So the authenticated group key exchange protocol is one of the most fundamental security components in network environment, particularly in contemporary wireless mobile/ad hoc networks.There are many key exchange protocols, but the password-based key exchange protocol accepts quite a lot of research because of its simple and practical advantages, however, most schemes aim at 2-party cases. In this paper a highly-efficient, password-based authenticated group-key exchange protocol named Pw/GAKE is constructed.This paper constructs a group password-based key exchange protocol Pw/GAKE which security is based-on the Decisional Diffie-Hellman Problem's hardness. All the members in the group share an mutual key and a set of public parameters, and every member has a fair persition. None of them can neither produce the shared key nor recover it. Every member in the group must provide the essential information to produce the key dynamicly. The authentication mechanism in the protcol can keep it safe. During this protocol's session, all group members have only one-round message transmission and only need to carry out exponential and fast hash computation(no public-key schemes are required), which make it particularly suitable to the mediate-scale groups in modern wireless/ad hoc networks. The protocol is security under the random-oracle model and the efficiency is being analyzed too. The paper has also gaven the essential algorithms and the implements in software. At last discusses its applicaotion in the mobile Ad Hoc network amply.
Keywords/Search Tags:Password-based Authentication, Decisional Diffie-Hellman Problem's Hardness, Group Key Exchange
PDF Full Text Request
Related items