In day-to-day life people are dealing with many remote applications related to two participants or multi-participant group conversation. These applications encapsulated with security advancement makes people conversationally reliable with security, but still, these applications are not reliable in terms of communication and computation cost, thus, many researchers also working on these. Inefficient communication and computation cost create congestion on a network and delay on a sender and receiver side as well. There are many key agreement and key generation schemes, which provide not only security but also efficient communication and computation. The key agreement protocol is a cryptographic scheme [1] that follows the process of exchanging public keys with each other by hiding the private key over an unsecured channel, after exchanging the public information the participants agree on the common session key and perform encryption and decryption process [2-4]. The process of the key exchange protocol based on two participants is shown in Fig. 1, where User-A shares its public key to User-B, in the same way User-B shares its public key to User-A. After exchanging the information both agree on a common session key for further process of encryption and decryption.
展开▼