Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups

  • 20 Accesses

  • 2 Citations


In today’s world, security is the main issue in all type of communication systems. Secure group communication is that where some members out of ‘n’, have the privilege to access the data of a particular group. The non interactive key computation for secure communication in dynamic groups is a main challenging issue. In the dynamic groups, the group size is not fixed, as the members may leave or join the group anytime. The non interactivity of the group communication says that there will not be any exchange of the keys among the group members. In this paper, we proposed a polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. In the proposed protocol, the polynomial is constructed in such a way that it may be used as a generalized polynomial for ‘n’ members and may be reformed every time by the server whenever there is any change in the group membership. In addition, the security of the polynomial session key depends on the value of coefficients of the variables in polynomial. In comparison with various existing protocols our proposed protocol is efficient in terms of computation, storage and communication complexities. The graphical results shows that the no. of rounds, no. of messages passed and total no. of exponentiations are completely reduced in our protocol.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4


  1. 1.

    Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

  2. 2.

    Kalaiselvi S, JabeenBegum S (2008) A secure group communication using non-interactive key computation in multiparty key agreement. In: International conference on computing, communication and networking, 2008. ICCCn 2008. IEEE, New York, pp 1–6

  3. 3.

    Steiner M, Tsudik G, Waidner M (1996) Diffie–Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security. ACM, New York, pp 31–37

  4. 4.

    Kumar CK, Jose GJA, Sajeev C, Suyambulingom C (2006) Safety measures against man-in-the-middle attack in key exchange. ARPN J Eng Appl Sci 7(2):243–246

  5. 5.

    Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1998) Perfectly secure key distribution for dynamic conferences. Inf Comput 146(1):1–23

  6. 6.

    Geetha BT, Srinath MV, Perumal V (2014) Group communication using a dynamic key generation protocol. Int J Adv Res Comp Sci Manag Stud 2(6):1–7

  7. 7.

    Ingemarsson I, Tang D, Wong C (1982) A conference key distribution system. IEEE Trans Inf Theory 28(5):714–720

  8. 8.

    Lv C, Ma M, Li H, Ma J, Zhang Y (2013) An novel three-party authenticated key exchange protocol using one-time key. J Netw Comput Appl 36(1):498–503

  9. 9.

    Tomar AS, Jaidhar CD, Tapaswi S (2012) Secure session key generation technique for group communication. Int J Inf Electron Eng 2(5):831

  10. 10.

    Aparna R, Amberker BB (2008) Authenticated secure group communication using broadcast encryption key computation. In: Fifth international conference on information technology: new generations, 2008. ITNG 2008. IEEE, New York, pp 348–353

  11. 11.

    Burmester M, Desmedt Y (1994) A secure and efficient conference key distribution system. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, pp 275–286

  12. 12.

    Aparna R, Amberker BB (2007) Dynamic authenticated secure group communication. World Acad Sci Eng Technol 34:359–362

  13. 13.

    Okamoto E, Tanaka K (1989) Key distribution system based on identification information. IEEE J Sel Areas Commun 7(4):481–485

Download references

Author information

Correspondence to Vinod Kumar.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Kumar, R. & Pandey, S.K. Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int. j. inf. tecnol. 12, 283–288 (2020). https://doi.org/10.1007/s41870-018-0140-1

Download citation


  • Group communication
  • Dynamic systems
  • Non-interactive
  • Polynomial session key