More Related Content
Similar to 50120130406002 (20)
More from IAEME Publication (20)
50120130406002
- 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 6, November - December (2013), pp. 09-15
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
©IAEME
MULTIPARTY KEY AGREEMENT PROTOCOL USING TRIPLE
DECOMPOSITION PROBLEM IN DISCRETE HEISENBERG GROUP
T.ISAIYARASI
Research Scholar, Bharathiar University &Assistant Professor
Department of Mathematics, Valliammai Engineering College
Tamil Nadu -603203, India
Dr.K.SANKARASUBRAMANIAN
Research Supervisor, Bharathiar University & Professor,
Department of Mathematics,Sri Sairam Engineering College.
Tamilnadu-600048, India
ABSTRACT
A Key Agreement Protocol (KAP) or mechanism is a key establishment technique in which a
shared key is derived by two (or more) parties as a function of information contributed by, or
associated with each of these such that no party can predetermine resulting value. This paper presents
a New Multiparty Key Agreement Protocol using the Triple Decomposition Search Problem .To
implement this; the Discrete Heisenberg group is chosen as the platform group. The protocol
depends on the hardness of Triple Decomposition Search problem in the Discrete Heisenberg group.
Keyword: Discrete Heisenberg group, Key Agreement Protocol, Triple Decomposition Search
problem.
1.
INTRODUCTION
A protocol is a multiparty algorithm, defined by a sequence of steps precisely specifying the
actions required of two or more parties in order to achieve a specified objective.
Key establishment is a process or protocol whereby a shared secret becomes available to two or more
parties, for subsequent cryptographic use. Key establishment may be broadly subdivided into key
transport and key agreement.
9
- 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
A key transport protocol or mechanism is a key establishment technique where one party
creates or otherwise obtains a secret value, and securely transfers it to the other(s).
A key agreement protocol or mechanism is a key establishment technique in which a shared
secret is derived by two (or more) parties as a function of information contributed by ,or associated
with ,each of these (ideally) such that no party can predetermine the resuming value. This paper
proposes a New Multiparty Key Agreement Protocol using Triple Decomposition Search problem. In
order to implement the Triple Decomposition Search Problem, the Discrete Heisenberg group is
chosen as the platform group. K parties agree on a common key in K- 1 rounds.
The paper is organised in the following manner. In section 2 introduces the discrete Heisenberg
group. Section 3 deals with the Triple Decomposition Problem. The Multiparty Key Agreement
Protocol using Triple Decomposition Problem is implemented in Section 4 . Section 5 discusses the
security of the protocol some of the encryption schemes are presented in Section 6 and Section 7
concludes the paper.
2.
INTRODUCTION TO DISCRETE HEISENBERG GROUP
The Discrete Heisenberg group ℋ may be described as the set
endowed with the following multiplication, where p is a prime
ሺݖ ,ݕ ,ݔሻ ሺݓ ,ݒ ,ݑሻ ൌ ሺ ݔ ݑ ݕ ,ݓݕ ݖ ,ݒ ݓሻ ݉ ݀
3
Z p
of all integer triples
2.1. Some Computational Facts about ℋ.
The following computational facts about ℋ can be easily derived from the definition of
Multiplication above.
2.1.1. Proposition.
Let ݊ ,ݓ ,ݒ ,ݑ ,ݖ ,ݕ ,ݔbe any integers. Then the multiplication in ℋ satisfies the following
equations:
(a) ሺݖ ,ݕ ,ݔሻିଵ ൌ ሺെ ݔ ,ݖݕെ ,ݕെݖሻ ݉ ݀
ሺb) ሺݖ ,ݕ ,ݔሻ ሺݓ ,ݒ ,ݑሻ ሺݖ ,ݕ ,ݔሻିଵ ൌ ሺ ݑ ݓݕെ ݓ ,ݒ ,ݒݖሻ ݉݀
(c) ሾሺݖ ,ݕ ,ݔሻ, ሺݓ ,ݒ ,ݑሻሿ ൌ ሺ ݓݕെ 0 ,0 ,ݒݖሻ ݉ ݀
(d) In particular, ሾሺ0, 1, 0ሻ, ሺ0, 0, 1ሻሿ ൌ ሺ1, 0, 0ሻ.
(e) (i)ሺ0 ,0 ,ݔሻ ሺ0, ݖ ,ݕሻ ൌ ሺ ݖ ,ݕ ,ݔሻ݉ ݀
(ii)ሺ0, 0 ,ݕሻ ሺ0, 0, ݖሻ ൌ ሺݖ ,ݕ ,ݖݕሻ ݉ ݀
(iii)ሺ0, 0, ݖሻ ሺ0, 0 ,ݕሻ ൌ ሺ0, ݖ ,ݕሻ ݉ ݀
(f) (i)(1, 0, 0)n = (n, 0, 0) mod p
(ii)ሺ0, 1, 0ሻ ൌ ሺ0, ݊, 0ሻ ݉ ݀
(iii)ሺ0, 0, 1ሻ ൌ ሺ0, 0, ݊ሻ ݉݀
2.1.2. Centre Z [ℋ]:
ℋ
ଷ
Centre of ℋ coincides with ܼ ൈ 0 ൈ 0 where ℋ ൌ ܼ , [H, H] = Z [H].
2.1.3. Generators of ℋ:
Formulae (d)-(f) show that (0, 1, 0) and (0, 0, 1) generate ℋ. Specifically, ሺݖ ,ݕ ,ݔሻ ൌ
ሾሺ0, 1, 0ሻ, ሺ0, 0, 1ሻሿ௫ ሺ0, 0, 1ሻ ௭ ሺ0, 1, 0ሻ௬ , ݂ ݈݈ܽ ݎሺݖ ,ݕ ,ݔሻ ݅݊ ℋ. for the next result, we use the
ሺିଵሻ
non-standard notation ݊ሺଶሻ to stand for ଶ , for any integer‘݊’.
10
- 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
2.2. Proposition.
For any ሺݖ ,ݕ ,ݔሻ ߳ ℋ and any݊ ߳ ܼ, we have ሺݖ ,ݕ ,ݔሻ ൌ ൫݊ ݔ ݊ሺଶሻ ݖ݊ ,ݕ݊ ,ݖݕ൯݉. ݀
2.3. Proposition.
ℋ may be presented as ൏ ߙ, ߚ: ሾߙ, ሾߙ, ߚሿሿ ൌ 1 ൌ ሾߚ, ሾߙ, ߚሿሿ ,with ߙ (resp., ߚ) corresponding to
the generator ሺ0, 1, 0ሻ (resp.,ሺ0, 0, 1ሻ). The following results have been already established:
2.3.1. Result 1:
Let L be any group, and let ߪ and ߬ be any elements of L satisfying the two relations given
above.
Then,
there
is
a
unique
homomorphism
݄ ℋ ՜ ܮ
such
that
݄ሺ0, 1, 0ሻ ൌ ߪ ܽ݊݀ ݄ሺ0, 0, 1ሻ ൌ ߬
2.3.2. Result 2:
Let σ and τ be any elements of ℋ. There exists a unique endomorphism h of ℋ such that
݄ሺ0, 1, 0ሻ ൌ ߪ ܽ݊݀ ݄ሺ0, 0, 1ሻ ൌ ߬ .
3.
THE TRIPLE DECOMPOSITION PROBLEM
In order to describe the system in a more general setting we assume the underlying structure
is a non-commutative group.
3.1. Definition: A non – commutative group G is an algebraic structure with a binary operation and
whose elements satisfy the following axioms.
(i)For ܽ, ܾ in ܾ .ܽ , ܩis in ( ܩClosure property)
(ii)For ܽ , ܾ , ܿ in .ܽ ܩሺܾ. ܿሻ ൌ ሺܽ. ܾሻ. ܿ (Associative property)
(iii)There exists an element ݁ in ܩsuch that for all ܽ in, ܽ . ݁ ൌ ݁ . ܽ ൌ ܽ
(iv) For all ܽ in ܩthere exists an element ܽିଵ in G such that ܽ . ܽିଵ ൌ ܽିଵ . ܽ ൌ ݁
(v) In general ܽ. ܾ ് ܾ . ܽ (non –commutativity)
3.2. Definition:
For an element g є G let ܥሺ݃ሻ ൌ ሼ ݄ є ݄݃ / ܩൌ ݄݃ ሽ. ܥሺ݃ሻ is called the centralizer of g
in G. For a subset ܪൌ ሼ ݃ଵ , ݃ଶ , ݃ଷ … … ݃ ሽof G, define ܥሺ ܪሻ ൌ ܥሺ݃ଵ , ݃ଶ … ݃ ሻ to be the set
of elements in G that commute with all ݃ for ݅ ൌ 1 ,2 , … . ݇ (Hence ܥሺܪሻ ൌ ܥሺ݃ଵ ሻ ת
ܥሺ݃ଶ ሻ ܥ ת … תሺ݃ ሻ ሻ
3.3. The Protocol:
The protocol goes as follows:
Alice picks two elementsݔଵ , ݔଶ ∈ , ܩchooses sets ܵ௫ଵ ܽ݊݀ ܵ௫ଶ which are subsets of
centralizers of ݔଵ ܽ݊݀ ݔଶ respectively. Alice publishes ܵ௫ଵ ܽ݊݀ ܵ௫ଶ Bob picks two elements
ݕଵ , ݕଶ ∈ , ܩchooses sets ܵ௬ଵ ܽ݊݀ ܵ௬ଶ which are subsets of centralizers of ݕଵ ܽ݊݀ ݕଶ respectively.
Bob publishes ܵ௬ଵ ܽ݊݀ ܵ௬ଶ Alice chooses random elements ܽଵ ∈ ܽ ,ܩଶ ∈ ܵ௬ଵ , ܽ ଷ ∈ ܵ௬ଶ .
ሺ ܽଵ , ܽଶ , ܽ ଷ ሻ is her private key.
She sends Bob her public key ሺ ݓ , ݒ , ݑሻ where ݑൌ ܽଵ ݔଵ , ݒൌ ݔଵ ିଵ ܽ ଶ ݔଶ , ݓൌ ݔଶ ିଵ ܽଷ
Bob chooses random elements ܾଵ ∈ ܵ௫ଵ , ܾଶ ∈ ܵ௫ଶ ܽ݊݀ ܾଷ ∈ ܩand sets ሺܾଵ , ܾଶ , ܾଷ ሻ as his private key
ିଵ
He sends Alice his public key ሺ ݎ , ݍ , ሻ where ൌ ܾଵ ݕଵ , ݍൌ ݕଵ ܾଶ ݕଶ , ݎൌ ݕଶ ିଵ ܾଷ
Alice computes ܽଵ ܽ ଶ ܽ ݍଷ ݎൌ ܽଵ ܾଵ ܽଶ ܾଶ ܽଷ ܾଷ ൌ ܭ
11
- 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
Bob computes 3ܾ ݓ 2ܾ ݒ 1ܾ ݑൌ ܽ1 ܾ1 ܽ2 ܾ2 ܽ 3 ܾ3 ൌ ܭ
ܭ ൌ ܭ ൌ ܭis their shared secret key
The security of the system depends on solving the equations
ݑൌ ܽଵ ݔଵ
… … … ሺ1ሻ
ିଵ
ݒൌ ݔଵ ܽଶ ݔଶ
… … … ሺ2ሻ
ିଵ
ݓൌ ݔଶ ܽଷ
… … … ሺ3ሻ to get the private key of Alice.
Solving equation (2), i.e., decomposing ݒas three elements ି ݔଵ , ܽଶ ܽ݊݀ ݔଶ is known as the
triple decomposition problem. In order to apply the triple decomposition, the platform group must
satisfy the following properties:
P1) The group should be a non commutative group of exponential growth.
P2) It should be computationally easy to perform group operations (multiplication and inversion)
P3) It should be computationally easy to generate pairs
ሺ ܽ , ሼ ܽଵ , … ܽ ሽሻܽ ܽ ݐ݄ܽݐ ݄ܿݑݏ ൌ ܽ ܽ ݂ ݅ ݎൌ 1 … ݇
P4) For a generic set ሼ ݃ଵ … . . ݃ ሽ of elements of the group it should be difficult to compute
ܥሺ݃ଵ … . . ݃ ሻ ൌ ܥሺ݃ଵ ሻ ܥ תሺ݃ଶ ሻ ܥ ת … … תሺ݃ ሻ
ଵ
ଵ
P5) Even if ܪଵ ൌ ܥሺ݃ଵ … . . ݃ ሻ and 2ܪൌ ܥሺ ݃ଵ . . . . ݃ ሻ are computed it should be hard to find
ݔЄ ܪଵ and ݕЄ ܪଶ and ܽ Є ܪwhere H is some fixed subgroup given by its generating set such that
ݕ ܽ ݔൌ ݒfor any ݒЄ ℋ .
4.
Implementation of Triple Decomposition Problem in Discrete Heisenberg Group:
K parties ܣଵ , ܣଶ … ܣ agree on the following:
ܑሻA finite non abelian group (Discrete Heisenberg group ℋ =Zp3) where p is a prime number
sufficiently large
ܑܑሻ Cyclic subgroupsܩଵ , ܩଶ ܩଷ , of ℋ such thatܩଵ ൌ ൏ ݁ , ݃ଵ , ݃ଶ , ܩଶ ൌ ൏ ݁, ݄ଵ , ݄ଶ andܩଷ ൌ ൏
݁, ݇ଵ , ݇ଶ .
iii)݃ ݄ ് ݄ ݃ , ݅ ൌ 1 ,2 ܽ݊݀ ݆ ൌ 1 ,2 . , ݃ ݇ ് ݇ ݃ , ݅ ൌ 1 ,2 ܽ݊݀ ݆ ൌ 1 ,2 , ݄ ݇ ് ݇ ݄ , ݅ ൌ
1 ,2 ܽ݊݀ ݆ ൌ 1 ,2
The following actions are carried out to arrive at a common shared key:
I Round:
ܣଵ chooses ܽଵ ܩ אଵ , ܾଵ , ݔଵ ܩ אଶ ܽ݊݀ ܿଵ , ݕଵ ܩ אଷ and computes
ିଵ
ିଵ
ݑଵଵ ൌ ܽଵ ݔଵ , ݒଵଵ ൌ ݔଵ ܾଵ ݕଵ , ݓଵଵ ൌ ݕଵ ܿଵ
ܣଶ chooses ܽଶ ܩ אଵ , ܾଶ , ݔଶ ܩ אଶ ܽ݊݀ ܿଶ, ݕଵ ܩ אଷ and computes
ିଵ
ିଵ
ݑଶଵ ൌ ܽଶ ݔଶ , ݒଶଵ ൌ ݔଶ ܾଶ ݕଶ , ݓଶଵ ൌ ݕଶ ܿଶ
ܣଷ chooses ܽଷ ܩ אଵ , ܾଷ, ݔଷ ܩ אଶ , ܿଷ , ݕଷ ܩ אଷ and computes
ିଵ
ିଵ
ݑଷଵ ൌ ܽଷ ݔଷ , ݒଷଵ ൌ ݔଷ ܾଷ ݕଷ , ݓଷଵ ൌ ݕଷ ܿଷ
…
ܣିଵ chooses ܽିଵ ܩ אଵ , ܾିଵ , ݔିଵ ܩ אଶ , ܿିଵ , ݕିଵ ܩ אଷ and computes
ିଵ
ିଵ
ݑሺିଵሻଵ ൌ ܽିଵ ݔିଵ , ݒሺିଵሻଵ ൌ ݔିଵ ܾିଵ ݕିଵ , ݓሺିଵሻଵ ൌ ݕିଵ ܿିଵ
ିଵ
ܣ chooses ܽ ܩ אଵ , ܾ , ݔ ܩ אଶ , ܿ , ݕ ܩ אଷ and computes ݑଵ ൌ ܽ ݔ , ݒଵ ൌ ݔ ܾ ݕ , ݓଵ ൌ
ିଵ
ݕ ܿ
ܣଵ sends (ݑଵଵ , ݒଵଵ , ݓଵଵ ሻ to ܣଶ
12
- 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
ܣଶ sends (ݑଶଵ , ݒଶଵ , ݓଶଵ ) to ܣଷ
ܣଷ sends (ݑଷଵ , ݒଷଵ , ݓଷଵ ) to A4
…
ܣିଵ sends (ݑሺିଵሻଵ , ݒሺିଵሻଵ , ݓሺିଵሻଵ ) to ܣ
ܣ sends (ݑଵ , ݒଵ , ݓଵ ) to ܣଵ
II Round:
ܣଵ computes ݑଵଶ ൌ ܽଵ ݑଵ , ݒଵଶ ൌ ܾଵ ݒଵ , ݓଵଶ ൌ ܿଵ ݓଵ and sends (ݑଵଶ , ݒଵଶ , ݓଵଶ ) to ܣଶ
ܣଶ computes ݑଶଶ ൌ ܽଶ ݑଵଵ , ݒଶଶ ൌ ܾଶ ݒଵଵ , ݓଶଶ ൌ ܿଶ ݓଵଵ and ሺݑଶଶ , ݒଶଶ , ݓଶଶ ) to ܣଷ
ܣଷ computes ݑଷଶ ൌ ܽଷ ݑଶଵ , ݒଷଶ ൌ ܾଷ ݒଶଵ , ݓଷଶ ൌ ܿଷ ݓଶଵ and sends ሺݑଷଶ , ݒଷଶ , ݓଷଶ ) to ܣସ
…
ܣ computes ݑଶ ൌ ܽ ݑሺିଵሻଵ , ݒଶ ൌ ܾ ݒሺିଵሻଵ , ݓଶ ൌ ܿ ݓሺିଵሻଶ and sends (ݑଶ , ݒଶ , ݓଶ ) to ݒଷଶ
(K-1)st Round:
ܣଵ computes ܭଵ ൌ ܽଵ ݑሺିଵሻ ܾଵ ݒሺିଵሻ ܿଵ ݓሺିଵሻ
ܣଶ computes ܭଶ ൌ ܽଶ ݑଵሺିଵሻ ܾଶ ݒଵሺିଵሻ ܿଶ ݓଵሺିଵሻ
ܣଷ computes ܭଷ ൌ ܽଷ ݑଶሺିଵሻ ܾଷ ݒଶሺିଵሻ ܿଷ ݓଶሺିଵሻ
…
ܣିଵ computes ܭሺିଵሻ ൌ ܽିଵ ݑሺିଶሻሺିଵሻ ܾିଵ ݒሺିଶሻሺିଵሻ ܿିଵ ݓሺିଶሻሺିଵሻ
ܣ computes ܭ ൌ ܽ ݑሺିଵሻሺିଵሻ ܾ ݒሺିଵሻሺିଵሻ ܿ ݓሺିଵሻሺିଶሻ
ܭଵ ൌ ܭଶ ൌ ڮൌ ܭ is their common shared key
5.
SECURITY ANALYSIS OF THE PROTOCOL
An adversary looking forܣଵ’s public key in first round needs to solve the following;
ݑଵଵ ൌ ܽଵ ݔଵ
Let ݑଵଵ ൌ ሺݑଵ , ݑଶ , ݑଷ ሻ
ܽଵ ൌ ሺܽ, ܾ, ܿ ሻ , ݔଵ ൌ ሺݖ ,ݕ ,ݔሻ
ݑଵଵ ൌ ሺܽଵ , ܾଵ , ܿଵ ሻ. ሺݔଵ , ݕଵ , ݖଵ ሻ ൌ ሺܽ ݔ ܾ ܾ , ݖ ܿ , ݕ ݖሻ
ݑଵ ൌ ܽ ݔ ܾݑ , ݖଶ ൌ ܾ ݑ ,ݕଷ ൌ ܿ . . … … … ݖሺ1ሻ
If he wants to solve a1 or x1, he has to solve the system of equations in (1)
Similarly he has to solve another set of equations of the same type as in (1) to recover ܽଷ or ݔଷ
from ݓଵଵ .
ିଵ
ݒଵଵ ൌ ݔଵ ܽଶ ݔଶ
Let ݒଵଵ ൌ ሺݒଵ , ݒଶ , ݒଷ ሻ, ݔଶ ൌ ሺݔଵ , ݕଵ , ݖଵ ሻ , ܽଶ ൌ ሺܽଵ , ܾଵ , ܿ ଵ ሻ,
ሺݒଵ , ݒଶ , ݒଷ ሻ = ሺ ݖ ,ݕ ,ݔሻିଵ . ሺܽଵ , ܾଵ , ܿ ଵ ሻ. ሺ ݔଵ , ݕଵ , ݖଵ ሻ
= ሺ ݕ ݖݔ ܽଵ ݔଵ ܾଵ ݖଵ െ ܿݕଵ െ ݖݕଵ െ ݕሺܿ ଵ ݖଵ ሻ, െ ݕ ܾଵ ݕଵ , െ ݖ ܿ ଵ ݖଵ ሻ
He has to solve the following system of equations,
ݒଵ ൌ െ ݕ ݖݔ ܽଵ ݔଵ ܾଵ ݖଵ െ ݖݕଵ െ ݕሺܿ ଵ ݖଵ ሻ
ݒଶ ൌ െ ݕ ܾଵ ݕ
ݒଷ ൌ െ ݖ ܿ ଵ ݖଵ
Solving for ݒis known as triple decomposition problem.
Similar procedure must be done if he wants to solve for the other entities private and public keys.
If the adversary looking for A1’s public key in the second round, he has to solve more complicated
equations.
13
- 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
6.
ENCRYPTION SCHEME
The K entities ܣଵ , ܣଶ , … ܣ may use their common key for encrypting and decrypting the messages.
6.1. Scheme 1:
Encryption:
If suppose ܣଵ wants to send a message ‘m’ to any of the other entities, he computes
ܧൌ ି ܭ ݉ ܭଵ And sends E.
Decryption:
Since the other entities know the value of K they decrypt as follows,
ܦൌ ି ܭଵ ܭ ܧൌ ି ܭଵ ି ܭ ݉ܭଵ ܭൌ ݉
6.2. Encryption Scheme 2:
Apart from having the common key, they may agree on an endomorphism
they may use the twisted contumacy search problem for encryption and decryption.
: ℋ → ℋ and
Encryption:
ܣଵ Computes ܧൌ ߮ ݉ ܭሺି ܭଵ ሻ and sends it to others.
Decryption:
Others have the value of K, they decrypt ܦൌ ି ܭଵ ߮ ܧሺܭሻ ൌ ି ܭܭଵ ݉ ߮ሺି ܭଵ ሻ߮ሺܭሻ ൌ ݉
Encryption Scheme 3:
ܣଵ Encrypts the message m by finding ܧൌ ݉ܭand sends to other entities.
Since they have the key K, they decrypt ܦൌ ି ܭଵ ܧൌ ି ܭଵ ݉ ܭൌ ݉
7.
CONCLUSION
This paper proposes a Multi party Key Agreement protocol using the triple decomposition
search problem which is implemented in Discrete Heisenberg group. K parties may arrive at a
common shared key in K-1 rounds. This protocol depends on the difficulty of solving triple
decomposition search problem in Discrete Heisenberg group. Solving the triple decomposition
search problem in the first round itself is a tedious process as discussed in Section 5. It is much more
difficult for an adversary to break the system in the second round and so for the remaining rounds,
since at each round the public keys of the communicating parties become more complicated to solve.
Hence the protocol presented in this paper provides a secure communication over any number of
parties. In continuation to this work, this protocol may be made secure against the man – in – middle
attack by providing authentication by means of digital signature.
REFERENCES
[1]
[2]
[3]
A.Joux, A One Round Protocol for tripartite Diffe-Hellman,In W.Bosma ,editor proceedings
of Algorithmic Number Theory ,Symposium ,ANTS IV ,volume 1838 of Lecture Notes in
Computer Science ,Pages 385 -394 Springer Verlag,2000
Alexei Myansnikov,Vladmir Shpilarain ,Alexander Ushakov, Group Based Cryptography,
2000 Mathematical Subject Classification: 11T71, 20Exx, 20Fxx, 20Hxx, 20P05,
60B15,68P25, 94A60,
Atul Chaturvedi, Varun Shukla,Tripartite Key Agreement Protocol using Conjugacy Problem
in Braid Groups. International Journal of Computer Applications (0975 – 8887) Volume 31–
No.1, October 2011
14
- 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
Chun-Li Lin, Hung-Min Sun, Michael Steiner and Tzonelih Hwang Three-party Encrypted
Key Exchange WithoutServer Public-Keys
Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, Member, IEEEg-Min Sun,
Michael Steiner and Tzonelih Hwang -New Multiparty Authentication Services and Key
Agreement Protocol
Ho –Kyu, Hyang –Sook Lee, Young –Ran Lee - Multiparty Authenticated Key Agreement
Protocols From Multilinear Forms.
Ko et al Public Key Cryptosystem based on Braid Groups , Crypto 2000 LNCS 1880,
pp66183
Peter J.Khan, Automorpisms of the Discrete Heisenberg Group, arXiv:math / 0405109VI
[math SG]6, May 2004
Rene’ Peralta,Eiji Okamoto,School of information science Some combinatorial problems of
importance to Cryptography
T.Isaiyarasi, Dr.K.Sankarasubramanian , “A New Multiparty Key Agreement Protocol Using
Search Problems in Discrete Heisenberg Group” ,Indian Journal Of Computer Science and
Engineering, Volume 3 ,Issue 1 ,Page No.159- 168.EISSn 0976 – 5166 ,Print ISSN : 2231 3850
Vladmir Shplrain and Alexander Ushakov, A new Key Exchange Protocol based on the
decomposition problem .2000 Mathematics Subject classification classification
94A60,20F05,20F06,68P5
Vladmir Shplrain and Gabrial Zapata, Using the subgroup membership search problem
in public key cryptography, www.sci.ccny.cuny.edu/~shpil/crypmemb.pdf
Yesem Kurt, A new key exchange primitive based on the triple decomposition problem
eprint.iacr.org/cryptodb/data/paper.pp?
Zhaohui Cheng, Luminita Vasiu and Richard Comley proposed Pairing- Based One –Round
Tripartite Key Agreement Protocol.
Samir Elouaham, Rachid Latif, Boujemaa Nassiri, Azzedine Dliou, Mostafa Laaboubi And
Fadel Maoulainine, “Analysis Electrocardiogram Signal Using Ensemble Empirical Mode
Decomposition And Time-Frequency Techniques”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 275 - 289, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME.
Aarti Bairagi and Shweta Yadav, “A New Parameter Proposed For Route Selection In
Routing Protocol For Manet”, International Journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 1, 2013, pp. 31 - 37, ISSN Print: 0976 – 6367, ISSN Online: 0976
– 6375, Published by IAEME
Wategaonkar D.N and Deshpande V.S., “On Improvement Of Performance For Transport
Protocol Using Sectoring Scheme In WSN”, International Journal of Computer Engineering
& Technology (IJCET), Volume 4, Issue 4, 2013, pp. 275 - 281, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375, Published by IAEME
Saloni Singla And Tripatjot Singh Panag., “Evaluating The Performance Of Manet Routing
Protocols”, International Journal of Computer Engineering & Technology (IJCET), Volume
4, Issue 1, 2013, pp. 125 - 130, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375,
Published by IAEME
15