适合资源有限设备的高效会议密钥协议

IF 3.4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Journal of Parallel and Distributed Computing Pub Date : 2024-11-14 DOI:10.1016/j.jpdc.2024.105011
Manmohan Pundir , Abhimanyu Kumar
{"title":"适合资源有限设备的高效会议密钥协议","authors":"Manmohan Pundir ,&nbsp;Abhimanyu Kumar","doi":"10.1016/j.jpdc.2024.105011","DOIUrl":null,"url":null,"abstract":"<div><div>Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"196 ","pages":"Article 105011"},"PeriodicalIF":3.4000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An efficient conference key agreement protocol suited for resource constrained devices\",\"authors\":\"Manmohan Pundir ,&nbsp;Abhimanyu Kumar\",\"doi\":\"10.1016/j.jpdc.2024.105011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.</div></div>\",\"PeriodicalId\":54775,\"journal\":{\"name\":\"Journal of Parallel and Distributed Computing\",\"volume\":\"196 \",\"pages\":\"Article 105011\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Parallel and Distributed Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0743731524001758\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Parallel and Distributed Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0743731524001758","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

会议密钥协议(CKA)对于确保多方信息传递和协作环境等面向群组场景的通信安全至关重要。虽然椭圆曲线加密算法(ECC)具有高效性和强大的安全性,但基于 ECC 的 CKA 协议通常依赖于昂贵的配对,这使得它们在资源有限的设备上部署时不切实际。本文介绍了一种使用 ECC 的新型 CKA 方法,无需配对计算,从而解决了可扩展性和效率方面的难题。所提出的协议采用质域椭圆曲线组上的标量点乘法,在减少计算开销的同时实现了安全高效的 CKA 操作。与现有的基于 ECC 的密钥协议相比,它最大限度地减少了用户级计算,并提高了计算效率、通信开销和安全强度。它特别适用于物联网和边缘计算等资源受限的环境,在这些环境中,计算资源有限,但安全的群组通信至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An efficient conference key agreement protocol suited for resource constrained devices
Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Parallel and Distributed Computing
Journal of Parallel and Distributed Computing 工程技术-计算机:理论方法
CiteScore
10.30
自引率
2.60%
发文量
172
审稿时长
12 months
期刊介绍: This international journal is directed to researchers, engineers, educators, managers, programmers, and users of computers who have particular interests in parallel processing and/or distributed computing. The Journal of Parallel and Distributed Computing publishes original research papers and timely review articles on the theory, design, evaluation, and use of parallel and/or distributed computing systems. The journal also features special issues on these topics; again covering the full range from the design to the use of our targeted systems.
期刊最新文献
Editorial Board Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues) Content delivery network solutions for the CMS experiment: The evolution towards HL-LHC A large-scale study of the impact of node behavior on loosely coupled data dissemination: The case of the distributed Arctic observatory GPU tabu search: A study on using GPU to solve massive instances of the maximum diversity problem
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1