EN
A secure multicast protocol based on pairings on elliptic curves
Abstract
The aim of this paper is to introduce a protocol for multicast distribution of secrets providing perfect forward and backward secrecy. The protocol is based on pairings on elliptic curves and has low cost communications and key storage. It is shown how this protocol improves some alternatives existing for real time communications.
Keywords
References
- N. Antequera and J. A. Lopez-Ramos, Pairings and secure multicast, Proceedings of the 11th International Conference on Computational and Mathematical Methods in Science and Engi- neering CMMSE 2011, Alicante, 2011, 114–119.
- J. M. Arrufat, J.A. Alvarez-Bermejo and J. A. Lopez-Ramos, Una implementaci´on paralela del CRA con aplicaciones crip- togr´aficas,VIII Jornadas de Matem´atica Discreta y Algor´ıtmica, Proceedings, Almer´ıa 2012, July 11th-13th, 2012, 267–274.
- J.-L. Beuchat, E. Lopez-Trejo, L. Martinez-Ramos, S. Mitsunari, and Francisco Rodriguez-Henriquez, Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves,Cryp- tology and Network Security (CANS 2009), LNCS 5888, 2009, 413–432.
- I. F. Blake, G. Seroussi and N. P. Smart, Advances in Elliptic Curve Cryptography, London Mathematical Society LNS Series 317, Cambridge University Press, Cambridge, 2005.
- D. Boneh and R. J. Lipton, Quantum cryptanalysis of hidden linear functions, Advances in Cryptology-CRYPTO ’95, Lecture Notes in Computer Sciences 963, Springer-Verlag, Berlin, 1995, 424–437.
- D. Boneh and A. Silverberg, Applications of Multilinear Forms to Cryptography,Contemp. Mathematics 324, 2003, 71–90.
- K. -C. Chan and S. -H. G. Chan, Key management approaches to offer data confidentiality for secure multicast, Network, IEEE 17(5), 2003, 30–39.
- G. -H. Chiou and W. -T. Chen, Secure broadcasting using the secure lock, IEEE Trans. Softw. Eng. 15(8), 1989, 929–934.
Details
Primary Language
English
Subjects
Applied Mathematics
Journal Section
Research Article
Publication Date
December 30, 2013
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2013 Volume: 2 Number: 4
APA
Alvarez-bermejo, J. A., & López-ramos, J. A. (2013). A secure multicast protocol based on pairings on elliptic curves. International Journal of Information Security Science, 2(4), 108-118. https://izlik.org/JA22HG26AL
AMA
1.Alvarez-bermejo JA, López-ramos JA. A secure multicast protocol based on pairings on elliptic curves. IJISS. 2013;2(4):108-118. https://izlik.org/JA22HG26AL
Chicago
Alvarez-bermejo, Jose Antonio, and Juan Antonio López-ramos. 2013. “A Secure Multicast Protocol Based on Pairings on Elliptic Curves”. International Journal of Information Security Science 2 (4): 108-18. https://izlik.org/JA22HG26AL.
EndNote
Alvarez-bermejo JA, López-ramos JA (December 1, 2013) A secure multicast protocol based on pairings on elliptic curves. International Journal of Information Security Science 2 4 108–118.
IEEE
[1]J. A. Alvarez-bermejo and J. A. López-ramos, “A secure multicast protocol based on pairings on elliptic curves”, IJISS, vol. 2, no. 4, pp. 108–118, Dec. 2013, [Online]. Available: https://izlik.org/JA22HG26AL
ISNAD
Alvarez-bermejo, Jose Antonio - López-ramos, Juan Antonio. “A Secure Multicast Protocol Based on Pairings on Elliptic Curves”. International Journal of Information Security Science 2/4 (December 1, 2013): 108-118. https://izlik.org/JA22HG26AL.
JAMA
1.Alvarez-bermejo JA, López-ramos JA. A secure multicast protocol based on pairings on elliptic curves. IJISS. 2013;2:108–118.
MLA
Alvarez-bermejo, Jose Antonio, and Juan Antonio López-ramos. “A Secure Multicast Protocol Based on Pairings on Elliptic Curves”. International Journal of Information Security Science, vol. 2, no. 4, Dec. 2013, pp. 108-1, https://izlik.org/JA22HG26AL.
Vancouver
1.Jose Antonio Alvarez-bermejo, Juan Antonio López-ramos. A secure multicast protocol based on pairings on elliptic curves. IJISS [Internet]. 2013 Dec. 1;2(4):108-1. Available from: https://izlik.org/JA22HG26AL