Article ID Journal Published Year Pages File Type
454521 Computers & Security 2011 36 Pages PDF
Abstract

The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and communication complexity and using proper assessments we compared their total energy cost. The evaluation of all protocols, interesting on its own, can also serve as a reference point for future works and contribute to the establishment of new, more efficient constant round protocols.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,