messages required to complete the protocol transac-
tions. The next column (dynamic) denotes whether
the protocol is dynamic or not, Auth denotes whether
authentication is provided and Verif denotes user ver-
ifiability and PS denotes provably secure.
The table shows that the proposed protocol, in-
spite of offering the verifiability and mutual authen-
tication property, is comparable to the existing works.
Apart from (Boyd and Nieto, 2003), the rest of the
protocols also use 2 exponentiations. The (Boyd and
Nieto, 2003), despite being computation efficient uses
n broadcasts which is expensive. In the proposed
protocol, most of the computations performed by the
users, i.e. encryption, hash computation and signa-
ture can be computed offline. Thus only a bit-wise xor
is the main operation to be performed online. More-
over, the offline computations are also less expensive
as the user performs a hash computation and one pub-
lic key encryption which is not expensive as a public
key (3− 16 bit) is short.
3 CONCLUSIONS
In this work we have provided an efficient and scal-
able solution for true-contributory group key agree-
ment in an heterogeneous environment, which con-
sists of both nodes with limited and relatively higher
computational resources. The protocol transfers most
of the computation and communication load to the
powerful node, whereas the only online computation
performed by a low power user is a single XOR com-
putation.
REFERENCES
Becker, K. and Wille, U. (1998). Communication com-
plexity of group key distribution. In In Proc. of 5th
ACM Conf. on Computer and Communications Secu-
rity, pages 1–6.
Boyd, C. and Nieto, J. (2003). Round-optimal contributory
conference key agreement. In In Proc. of PKC2003,
LNCS 2567, pages 161–174.
Bresson, E. and Catalano, D. (2004). Constant round au-
thenticated group key agreement via distributed com-
putation. In In Proc. of 7th International Workshop
on Practice and Theory in Public Key Cryptography
(PKC’04), LNCS 2947, pages 115–129.
Burmester, M. and Desmedt, Y. (1994). A secure and effi-
cient conference key distribution system. In In Proc.
of Eurocrypt’94, LNCS 950, pages 275–286.
E. Bresson, O. Chevassut, A. E. and Pointcheval, D. (2004).
Mutual authentication and group key agreement for
low-power mobile devices. In Computer Communi-
cations, volume 27, pages 1730–1737.
E. Bresson, O. Chevassut, D. P. and Quisquater, J.-J. (2001).
Provably authenticated group diffie-hellman key ex-
change. In In Proc. of 8th ACM Conf. on Computer
and Communications Security, pages 255–264.
G. Ateniese, M. S. and Tsudik, G. (2000). New multiparty
authentication services and key agreement protocols.
In IEEE Journal on Selected Areas in Communica-
tions, volume 18, pages 628–639.
Hwang, K. and Chang, C. (2003). A self-encryption mecha-
nism for authentication of roaming and teleconference
services. In IEEE Transaction on Wireless Communi-
cations, volume 2, pages 400–407.
I. Ingermarsson, D. T. and Wong, C. (1982). A conference
key distribution system. In IEEE Trans. on Informa-
tion Theory, volume 28, pages 714–720.
J. Nam, S. K. and Won, D. (2005a). Secure group commu-
nications over combined wired and wireless networks.
In Proc. of TrustBus, Lecture Notes in Computer Sci-
ence, volume 3592, pages 90–99.
J. Nam, S. K. and Won, D. (2005b). A weakness in
the bresson-chevassut-essiari-pointcheval’s group key
agreement scheme for low-power mobile devices. In
IEEE Communications letters, volume 9, pages 429–
431.
J. Nam, J. Lee, S. K. and Won, D. (2005c). Ddh-based
group key agreement in a mobile environment. In
Journal of Systems and Software, volume 78, pages
73–83.
Katz, J. and Yung, M. (2003). Scalable protocols for authen-
ticated group key exchange. In In Proc. of Crypto’03,
pages 110–125.
Tseng, Y. (2007). A resource-constrained group key agree-
ment protocol for imbalanced wireless networks. In
Computers and Security, volume 26, pages 331–337.
Tzeng, W. and Tzeng, Z.-J. (2000). Round-efficient confer-
ence key agreement protocols with provable security.
In In Proc. of Asiacrypt’00, LNCS 1976, pages 614–
627.
Y. Jiang, C. Lin, M. S. and Shen, X. S. (2006). A self-
encryption authentication protocol for teleconference
services. In International Journal of Security and Net-
works, volume 1, pages 198 – 205.
AN EFFICIENT GROUP KEY AGREEMENT PROTOCOL FOR HETEROGENEOUS ENVIRONMENT
189