Outline. The paper is organized as follows: In Section 2, we present a new key agreement protocol for ad hoc environ- ments. It is efficient both in communication and computa- tion terms. Also, most of the exchanged messages are in- dependent of each other, thus making it possible to collect them before the group is defined. In Section 3 we present a security analysis of the same and convert it into an authenti- cated key agreement protocol. In Section 4, we present our Mi: ith participant in the current session. Ml: The group leader: A member that is elected to coor- dinate group-level computation such as group-membership and group key management. Can be chosen randomly or by some application specific criteria. −
Appears in 5 contracts
Samples: Efficient Group Key Agreement, Efficient Group Key Agreement, Efficient Group Key Agreement
Outline. The paper is organized as follows: In Section 2, we present a new key agreement protocol for ad hoc environ- ments. It is efficient efficient both in communication and computa- tion terms. Also, most of the exchanged messages are in- dependent of each other, thus making it possible to collect them before the group is defineddefined. In Section 3 we present a security analysis of the same and convert it into an authenti- cated key agreement protocol. In Section 4, we present our Mi: ith participant in the current session. Ml: The group leader: A member that is elected to coor- dinate group-level computation such as group-membership and group key management. Can be chosen randomly or by some application specific specific criteria. −
Appears in 3 contracts
Samples: Efficient Group Key Agreement, Efficient Group Key Agreement, sorcersoft.org
Outline. The paper is organized as follows: In Section 2, we present a new key agreement protocol for ad hoc environ- ments. It is efficient both in communication and computa- tion terms. Also, most of the exchanged messages are in- dependent of each other, thus making it possible to collect them before the group is defined. In Section 3 we present a security analysis of the same and convert it into an authenti- cated key agreement protocol. In Section 4, we present our Mi: ith participant in the current session. Ml: The group leader: A member that is elected to coor- dinate group-level computation such as group-membership and group key management. Can be chosen randomly or by some application specific criteria. −− ri: A random number (from [1, q 1]) generated by mem- ber Mi for each session. Also called the secret for Mi.
Appears in 1 contract
Samples: Efficient Group Key Agreement