CFP last date
22 April 2024
Reseach Article

Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function

by Uday Pratap Singh, Rajkumar Singh Rathore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 19
Year of Publication: 2013
Authors: Uday Pratap Singh, Rajkumar Singh Rathore
10.5120/10039-5055

Uday Pratap Singh, Rajkumar Singh Rathore . Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function. International Journal of Computer Applications. 61, 19 ( January 2013), 35-40. DOI=10.5120/10039-5055

@article{ 10.5120/10039-5055,
author = { Uday Pratap Singh, Rajkumar Singh Rathore },
title = { Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 19 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number19/10039-5055/ },
doi = { 10.5120/10039-5055 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:09:54.752438+05:30
%A Uday Pratap Singh
%A Rajkumar Singh Rathore
%T Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 19
%P 35-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Key management is an essential cryptographic primitive upon which other security primitives are built. However, there are many existing key management schemes that lack on some points and those are not much suitable for ad hoc networks. In this paper we are going to present a distributed hierarchical group key management approach that uses Elliptic Curve Cryptography and Hash function for secure generation and distribution of group key.

References
  1. Key Management Definition. Available at:
  2. http://en. wikipedia. org/wiki/Key_management
  3. S. Anahita Mortazavi, Alireza Nemaney Pour, An Efficient Distributed Group Key Management using Hierarchical Approach with Diffie-Hellman and Symmetric Algorithm: DHSA 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011.
  4. Y. Kim, A. Perrig and G. Tsudik, Tree-based Group Key Agreement, ACM Transactions on Information and System Security (TISSEC), Vol. 7/1, Feb. 2004, pp. 60-94, doi: 10. 1145/984334. 984337.
  5. The Network Simulator - ns-2. Available at
  6. www. isi. edu/nsnam/ns.
  7. Muhammad Yasir Malik Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor, ICACT 2010, ISBN 978-89-5519-146-2 Feb. 7-10, 2010.
  8. Lauter Kristin, The Advantages of Elliptic Curve Cryptography For Wireless Security, IEEE Wireless Communications, February 2004.
  9. William Stallings, Cryptography and Network Security Principle and Practice, Fourth Edition.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Group Key Management Public Key Hash Function