Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 19
Year of Publication: 2013
Authors:
Uday Pratap Singh
Rajkumar Singh Rathore
10.5120/10039-5055

Uday Pratap Singh and Rajkumar Singh Rathore. Article: Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function. International Journal of Computer Applications 61(19):35-40, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Uday Pratap Singh and Rajkumar Singh Rathore},
	title = {Article: Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {19},
	pages = {35-40},
	month = {January},
	note = {Full text available}
}

Abstract

Key management is an essential cryptographic primitive upon which other security primitives are built. However, there are many existing key management schemes that lack on some points and those are not much suitable for ad hoc networks. In this paper we are going to present a distributed hierarchical group key management approach that uses Elliptic Curve Cryptography and Hash function for secure generation and distribution of group key.

References

  • Key Management Definition. Available at:
  • http://en. wikipedia. org/wiki/Key_management
  • S. Anahita Mortazavi, Alireza Nemaney Pour, An Efficient Distributed Group Key Management using Hierarchical Approach with Diffie-Hellman and Symmetric Algorithm: DHSA 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011.
  • Y. Kim, A. Perrig and G. Tsudik, Tree-based Group Key Agreement, ACM Transactions on Information and System Security (TISSEC), Vol. 7/1, Feb. 2004, pp. 60-94, doi: 10. 1145/984334. 984337.
  • The Network Simulator - ns-2. Available at
  • www. isi. edu/nsnam/ns.
  • Muhammad Yasir Malik Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor, ICACT 2010, ISBN 978-89-5519-146-2 Feb. 7-10, 2010.
  • Lauter Kristin, The Advantages of Elliptic Curve Cryptography For Wireless Security, IEEE Wireless Communications, February 2004.
  • William Stallings, Cryptography and Network Security Principle and Practice, Fourth Edition.