A twofold group key agreement protocol for NoC based MPSoCs

Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean Michel Dricot

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

4 Citations (Scopus)

Abstract

A symmetric group key agreement protocol enables the group members to derive a shared session key for secure communication among them, while an asymmetric one facilitates security to any communication from outside, without adding outsiders into the group. In this paper, we propose a twofold group key agreement protocol which addresses the need of a shared symmetric key among insider members in a group and an asymmetric key pair for any unrestricted sender. In particular, we look forward for a solution to provide secure communication among multiple processing clusters (PCs) actively running on an integrated circuit (IC). The proposed protocol offers a lightweight symmetric encryption for intra zone communication and a public key encryption for inter zone communication taking most advanced security issues into account.

Original languageEnglish
Title of host publication2018 16th Annual Conference on Privacy, Security and Trust (PST)
EditorsKieran McLaughlin, Ali Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason Nurse
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages325-326
Number of pages2
ISBN (Electronic)9781538674932
ISBN (Print)9781538674949
DOIs
Publication statusPublished - 2018
EventAnnual Conference on Privacy, Security and Trust 2018 - Belfast, Northern Ireland, United Kingdom
Duration: 28 Aug 201830 Aug 2018
Conference number: 16th
https://pstnet.ca/pst2018/

Conference

ConferenceAnnual Conference on Privacy, Security and Trust 2018
Abbreviated titlePST 2018
CountryUnited Kingdom
CityBelfast, Northern Ireland
Period28/08/1830/08/18
Internet address

Keywords

  • Asymmetric group key agreement
  • Batch verification
  • ID-based cryptography
  • Twofold group key agreement

Cite this