{"title":"适合资源有限设备的高效会议密钥协议","authors":"Manmohan Pundir , Abhimanyu Kumar","doi":"10.1016/j.jpdc.2024.105011","DOIUrl":null,"url":null,"abstract":"<div><div>Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"196 ","pages":"Article 105011"},"PeriodicalIF":3.4000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An efficient conference key agreement protocol suited for resource constrained devices\",\"authors\":\"Manmohan Pundir , Abhimanyu Kumar\",\"doi\":\"10.1016/j.jpdc.2024.105011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.</div></div>\",\"PeriodicalId\":54775,\"journal\":{\"name\":\"Journal of Parallel and Distributed Computing\",\"volume\":\"196 \",\"pages\":\"Article 105011\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Parallel and Distributed Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0743731524001758\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Parallel and Distributed Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0743731524001758","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
An efficient conference key agreement protocol suited for resource constrained devices
Conference key agreement (CKA) is essential for securing communication in group-oriented scenarios like multi-party messaging and collaborative environments. While elliptic curve cryptography (ECC) offers efficiency and strong security, ECC-based CKA protocols often rely on expensive pairings, making them computationally impractical for deployment over the resource limited devices. This paper introduces a novel CKA approach using ECC without requiring pairing computations, thus addressing scalability and efficiency challenges. The proposed protocol employs scalar point multiplications over a prime field elliptic curve group, enabling secure and efficient CKA operations with reduced computational overhead. Compared to existing ECC-based key agreement protocols, it minimizes user-level computation and enhances performance in computational efficiency, communication overhead, and security strength. Particularly suitable for resource-constrained environments like IoT and edge computing, where computational resources are limited yet secure group communication is crucial.
期刊介绍:
This international journal is directed to researchers, engineers, educators, managers, programmers, and users of computers who have particular interests in parallel processing and/or distributed computing.
The Journal of Parallel and Distributed Computing publishes original research papers and timely review articles on the theory, design, evaluation, and use of parallel and/or distributed computing systems. The journal also features special issues on these topics; again covering the full range from the design to the use of our targeted systems.