Font Size: a A A

Tree-Based Group Key Agreement Protocols In Ad Hoc Networks

Posted on:2010-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:W GaoFull Text:PDF
GTID:2178360272982703Subject:Cryptography
Abstract/Summary:PDF Full Text Request
As group-oriented and collaborative applications is getting popularity, the needs for the secure and reliable group communications increase. One of its important challenges in the secure and reliable group communications is to design secure and efficient group key management. There are two kinds of group key managements: group key distribution for the centralized management and group key agreement for the distributive management. Group key agreement scheme is more adaptable than group key distribution in DPG in which its membership can be frequently changed. As far as the communication and computational cost concerned, the existing group key management protocols such as STR and TGDH can reduce the cost by using binary trees. In the tree-based mechanism, it is noticed that the computational cost can be reduced by lowering the depth of the tree. In this thesis, we propose twomore efficient tree-based key agreement protocols.This paper presents two new protocols based on existing protocols. One is a secure ternary tree based authenticated group key agreement protocol in dynamic scenario. Ternary trees are introduced into key agreement protocol to reduce more rounds than the ones with binary trees and reduce computation complexity from O (log2m )to O (log3m ). In contrast to the traditional key distribution scheme, the contributory key agreement avoids the centralized trust and the requirement of the establishment of pairwise secret channels. The other is introducing n-ary trees obtained by extending ternary trees into key agreement protocol, which reduces more rounds than the ones with ternary trees and reduces computation complexity from O (log3m )to O (lognm ).At the same time, the scheme takes into account the dynamic case which contains the join and leave scenario and presents a good solution. It, on one hand, ensures the minimum computation complexity. On the other hand, the solution retains the tree structure. At the last, we give a security analysis based on the random oracle security model.
Keywords/Search Tags:contributory dynamic key agreement, provably security, ternary trees, n-ary trees, the random oracle security model
PDF Full Text Request
Related items