Abstract

In current network environment, it is difficult to determine a completely trusted third party to achieve secure key distribution. To solve this problem, this article proposes a method to build a secure communication channel for communication without a trusted third party. It is suitable for the environment with wide distribution, limited computing power and storage capacity, such as intelligent terminal sensor network. This letter realizes multi-dimensional virtual permutation, designs the security model and detailed process of the protocol for virtual permutation function. It can generate a large number of keys conforming to the security rules quickly. Then we carry out security analysis and performance evaluation for the group key agreement protocol based on multi-dimensional virtual permutation. The result shows this protocol improves the security and efficiency.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.