Affiliation:
1. Mepco Schlenk Engineering College, India
Abstract
This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys, we can assume the existence of a public-key infrastructure (PKI) which provides parties with some mechanisms for secure key registration and secure access to long-term keys of prospective peers. In most cases, there is also a need for some temporary keys. The Group Key Exchange protocols can be classified as Centralized, Distributed or Contributory. A few toolkits such as Spread and Cliques for the implementation of Group Key Exchange Protocols are also discussed.
Reference17 articles.
1. Secure group communication using robust contributory key agreement
2. Amir, Y., & Stanton, J. (1998). The Spread wide area group communication system (Tech. Rep. 98-4). Johns Hopkins University, Center of Networking and Distributed Systems.
3. Diffie–Hellman technique: extended to multiple two-party keys and one multi-party key
4. Burmester, M., & Desmedt, Y. (1994, May). A secure and efficient conference key distribution system. In Advances in Cryptology EUROCRYPT’94.
5. The VersaKey framework: Versatile group key management.;G.Caronni;IEEE Journal on Selected Areas in Communications,1999