Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key

@article{Biswas2008DiffieHellmanTE,
  title={Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key},
  author={Gautam Biswas},
  journal={IET Information Security},
  year={2008},
  volume={2},
  pages={12-18}
}
The two-party Diffie–Hellman (DH) key-exchanging technique is extended to generate (i) multiple twoparty keys and (ii) one multi-party key. The participants in the former case exchange two public keys and generate 15 shared keys. Of these, 4 keys are called base keys, because they are used to generate the other 11 keys called extended keys. The main advantages are the reduction of the key exchange overhead, increase of additional protection to the keys and widening of applicability. In the… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

Cryptanalysis of Tseng-Wu Group Key Exchange Protocol

I. J. Network Security • 2016
View 5 Excerpts
Highly Influenced

Secure object tracking protocol for Networked RFID Systems

2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) • 2015
View 7 Excerpts
Highly Influenced

3-Level security based spread spectrum image steganography with enhanced peak signal to noise ratio

2017 Fourth International Conference on Image Information Processing (ICIIP) • 2017

LRXE: Lite-RSA for XML Encryption suitable for computational constraint devices

2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN) • 2014
View 2 Excerpts

Similar Papers

Loading similar papers…