Int J Performability Eng ›› 2020, Vol. 16 ›› Issue (6): 875-882.doi: 10.23940/ijpe.20.06.p6.875882

Previous Articles     Next Articles

A BD Group Key Negotiation Protocol based on Clustering Technology

Zengyu Caia,b, Zuodong Wub,c, Jianwei Zhangb,c,*, and Wenqian Wanga,b   

  1. a School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China;
    b Henan Key Laboratory of Food Safety Data Intelligence, Zhengzhou, 450002, China;
    c Software College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
  • Submitted on ; Revised on ; Accepted on
  • Contact: * E-mail address: mailzjw@163.com
  • About author:Zengyu Cai is an associate professor at Zhengzhou University of Light Industry. His research interests include trusted computing, plan recognition, and information security.
    Zuodong Wu is pursuing his master's degree at Zhengzhou University of Light Industry. His research interests include network security and cloud computing.
    Jianwei Zhang is a professor at Zhengzhou University of Light Industry. His research interests include broadband information network and network security.
    Wenqian Wang is pursuing her master's degree at Zhengzhou University of Light Industry. Her research interests include network security and artificial intelligence.
  • Supported by:
    This work is supported by the National Natural Science Foundation of China (No. 61672471), Key Technologies R&D Program of Henan Province (No. 202102210176), Fourth Batch of Innovative Leading Talents of Zhihui Zhengzhou 1125 Talent Gathering Plan (ZhengZheng [2019] No. 21), and Liaoning Provincial Department of Education Project (No. LQN201912).

Abstract: Nowadays, there are usually large network groups. If the traditional group key negotiation protocol is adopted, the time cost consumed is very high and unrealistic when the session key calculation requires the participation of members in each group. To solve this problem, we propose a BD group key negotiation protocol based on clustering technology, which solves the defects of parallel key negotiation by clustering. We also conduct a security analysis under the assumption of discrete logarithm problem on elliptic curve and the Diffie-Hellman problem, which theoretically proves its security. Finally, the theoretical analysis and experimental results show that compared with existing key negotiation schemes, this protocol has good robustness, scalability, and lower communication and computing overhead, which has certain guiding significance for the research on user privacy protection in mobile cloud computing networks.

Key words: clustering technology, discrete logarithm, Diffie-Hellman, robustness, scalability, privacy protection