{"title":"Performance Evaluation of ID-based Group Key Agreement Protocols","authors":"Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis","doi":"10.1109/ARES.2011.63","DOIUrl":null,"url":null,"abstract":"In this paper we present all ID-based Group Key Agreement (GKA) protocols proposed so far in the literature and evaluate their efficiency. The protocols have been categorized into 5 different classes and we have computed their computation and communication complexity having as parameter the size of the group. Our theoretical analysis shows in detail the computation and communication cost of the protocols taking into account also the size of the sent messages, while our extensive experimental assessments compare their total energy cost for different group sizes. Furthermore, our evaluation is presented in a generalized way and can therefore serve as a reference point for future evaluations and for the design of new, improved ID-based GKA protocols.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Sixth International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2011.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper we present all ID-based Group Key Agreement (GKA) protocols proposed so far in the literature and evaluate their efficiency. The protocols have been categorized into 5 different classes and we have computed their computation and communication complexity having as parameter the size of the group. Our theoretical analysis shows in detail the computation and communication cost of the protocols taking into account also the size of the sent messages, while our extensive experimental assessments compare their total energy cost for different group sizes. Furthermore, our evaluation is presented in a generalized way and can therefore serve as a reference point for future evaluations and for the design of new, improved ID-based GKA protocols.