Abstract:
In current network environment, it is difficult to determine a completely trusted third party to achieve secure key distribution. To solve this problem, this article prop...Show MoreMetadata
Abstract:
In current network environment, it is difficult to determine a completely trusted third party to achieve secure key distribution. To solve this problem, this article proposes a method to build a secure communication channel for communication without a trusted third party. It is suitable for the environment with wide distribution, limited computing power and storage capacity, such as intelligent terminal sensor network. This letter realizes multi-dimensional virtual permutation, designs the security model and detailed process of the protocol for virtual permutation function. It can generate a large number of keys conforming to the security rules quickly. Then we carry out security analysis and performance evaluation for the group key agreement protocol based on multi-dimensional virtual permutation. The result shows this protocol improves the security and efficiency.
Published in: IEEE Communications Letters ( Volume: 24, Issue: 12, December 2020)