2012
DOI: 10.1002/sec.429
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: The self-healing group key distribution scheme with revocation can deal with the problem of distributing session keys for secure group communication over an unreliable wireless network, with the capability to resist packet loss and collusion attack. However, existing access-polynomial-based self-healing key management schemes have some problems, such as the small number of active group members, much redundancy in the key updating broadcast packet, and limited collusion attack resistance capability. In order to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Zou et al [ 28 ] proposed the first access polynomial based SGKD (AP-SGKD) scheme. After that, some AP-SGKD schemes are proposed [ 29 , 30 , 31 , 32 , 33 , 34 ], which can guarantee the group nodes’ identity privacy and reduce the storage overhead to the constant. More recently, Sun et al [ 35 ] proposed an AP-SGKD scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Zou et al [ 28 ] proposed the first access polynomial based SGKD (AP-SGKD) scheme. After that, some AP-SGKD schemes are proposed [ 29 , 30 , 31 , 32 , 33 , 34 ], which can guarantee the group nodes’ identity privacy and reduce the storage overhead to the constant. More recently, Sun et al [ 35 ] proposed an AP-SGKD scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Both of them guarantee that only legitimate users can recover the session key(s), while illegitimate users cannot. The SGKD schemes in [ 5 , 7 20 ] are based on the revocation polynomial, and schemes in [ 27 30 ] are based on the access polynomial.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the hash chain, another cryptographic technique, is used to design the SGKD scheme with other cryptographic techniques. The schemes in [ 9 20 ] are hash chain and revocation polynomial-based SGKD (HC&RP-SGKD) schemes, and schemes in [ 29 , 30 ] are hash chain and access polynomial-based SGKD (HC&AP-SGKD) schemes.…”
Section: Introductionmentioning
confidence: 99%