Advertisement

Group Key Establishment

  • Colin Boyd
  • Anish Mathuria
  • Douglas Stebila
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

As electronic communications and information services become more sophisticated, many applications involving multiple entities become necessary. Since these applications will generally require secure communications it is necessary to design protocols that establish keys for groups of principals. There is a great variety of different practical requirements that may be appropriate in different applications, and the number of protocols is very large. In this chapter we will mainly restrict attention to ways in which the two-party protocols that have been explored in previous chapters can be generalised to the multi-party situation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Authors and Affiliations

  • Colin Boyd
    • 1
  • Anish Mathuria
    • 2
  • Douglas Stebila
    • 3
  1. 1.Department of Information Security and Communication TechnologyNorwegian University of Science and TechnologyTrondheimNorway
  2. 2.Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)GandhinagarIndia
  3. 3.Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooCanada

Personalised recommendations