2021
DOI: 10.1007/s11227-020-03561-y
|View full text |Cite
|
Sign up to set email alerts
|

A secure blockchain-based group key agreement protocol for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 46 publications
0
19
0
Order By: Relevance
“…From the perspective of system design, a blockchain must contain a consensus protocol to address the issue of agreement among trustless nodes. Because the decentralized blockchain architecture is well-suited to original distributed network designs, it has also attracted considerable attention for its potential to fulfill a wide variety of functions (tasking [10] and key management [11]) inspiring promising blockchain projects such as XRP [12], ETH [13], and Cosmos [14]. In general, blockchains are decentralized, shared ledgers with tamperproof, nonforgeable, and traceable characteristics.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…From the perspective of system design, a blockchain must contain a consensus protocol to address the issue of agreement among trustless nodes. Because the decentralized blockchain architecture is well-suited to original distributed network designs, it has also attracted considerable attention for its potential to fulfill a wide variety of functions (tasking [10] and key management [11]) inspiring promising blockchain projects such as XRP [12], ETH [13], and Cosmos [14]. In general, blockchains are decentralized, shared ledgers with tamperproof, nonforgeable, and traceable characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…String 11 Wireless Communications and Mobile Computing blockchain architecture itself; therefore, in this subsection, we discuss methods to enhance the security of the blockchain.…”
mentioning
confidence: 99%
“…Moreover, attribute revocation is also an intractable problem in CP-ABE and requires extra computation and communication costs to deal with. With this in mind, many researchers study the issue of data sharing in IoT with a different primitive: group key management [5,6]. However, traditional group key management shows poor flexibility and scalability for multigroup access control.…”
Section: Introductionmentioning
confidence: 99%
“…[38], [39], or chaotic map such as [40]. Some other researchers tried to provide decentralized solutions by basing their protocol on the blockchain-based platforms such as [41], [42], [43]. Some recent works also have been conducted also that could be good choices for post quantum cryptography, because they are based on primitives that are secure against quantum computer such as lattice based cryptography, e.g.…”
Section: B State Of the Artmentioning
confidence: 99%