Abstract
A key exchange protocols are generally used in order to exchange a cryptographic session key, such that no one except the communicating party must be able to deduce the keys lifetime. In this paper we propose a protocol which can be used for multi-party key exchange amongst the entities with less number of iterations, and also the same protocol can be used for sharing the messages amongst the entities, the key advantage of this protocol is when we are using this protocol for the multi-party key exchange as it requires very less result when compared with conventional two move Diffie-Hellman key exchange protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: EUROCRYPT 2001, pp. 451–469 (2001)
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelink, S., Zimmermann, P.: In: 2nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, pp. 1–5, October 2015
Sauerbier, C.: Computing a Discrete Logarithm in O(n3). https://arxiv.org/ftp/arxiv/papers/0912/0912.2269.pdf. Accessed 17 Sept 2017
Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26, 94–97 (2007)
University of Texas. https://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/gupta_gdh.pdf. Accessed 24 Sept 2017
AL-Sammarraie, O.A., Bashir, M.A.: Generalization of Newton’s forward interpolation formula. Int. J. Sci. Res. Publ. 5(3), 1–5 (2015)
Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2006)
Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1(2), 69–71 (2012)
Khader, A.S., Lai, D.: Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol. In: 22nd International Conference on Telecommunications (ICT 2015), pp. 204–208 (2015)
McCurley, K.S.: Proceedings of Symposia in Applied Mathematics, vol. 42, pp. 49–69, 8–9 August 1989
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Paliwal, S., Aswani Kumar, C. (2018). A Novel Multi-party Key Exchange Protocol. In: Abraham, A., Muhuri, P., Muda, A., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2017. Advances in Intelligent Systems and Computing, vol 736. Springer, Cham. https://doi.org/10.1007/978-3-319-76348-4_58
Download citation
DOI: https://doi.org/10.1007/978-3-319-76348-4_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76347-7
Online ISBN: 978-3-319-76348-4
eBook Packages: EngineeringEngineering (R0)