2013
DOI: 10.1002/dac.2569
|View full text |Cite
|
Sign up to set email alerts
|

An authenticated group key distribution mechanism using theory of numbers

Abstract: SUMMARY A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In 2010, Harn and Lin proposed an authenticated group key distribution protocol using polynomial‐based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese remainder theorem. In this paper, we point out that there are some security problems of Guo and Chang's protocol and propose a simpler authenticated group key distrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 29 publications
(51 reference statements)
0
6
0
Order By: Relevance
“…Determine i 0 by 4Step 3. Determine D L by (8) Step 4. Select two unordered secrets s 1 , s 2 satisfying 9Step 5.…”
Section: □ Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…Determine i 0 by 4Step 3. Determine D L by (8) Step 4. Select two unordered secrets s 1 , s 2 satisfying 9Step 5.…”
Section: □ Remarkmentioning
confidence: 99%
“…It shows that the secret can be recovered by any no less than t shares, while the recovery failure with fewer than t shares. Besides this kind of SS scheme, there are many other types, such as Mignotte's scheme [6], the Chinese Remainder eorem-(CRT-) based Asmuth-Bloom scheme [7] and its generalizations [8,9], and ramp secret-sharing scheme [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…x S , are needed to recover a polynomial of degree t-1 in (t, n)-SSS. This scheme has been proven to be unconditionally secure [13][14][15], and it is used extensively in many applications of information security, such as group key distribution protocols [16][17][18], group authentication [19], and data outsourcing systems [9][10][11]. The following example illustrates the execution of a (3, 3)-SSS.…”
Section: Secret Reconstruction Proceduresmentioning
confidence: 99%
“…3,4 This is because most broadcast environments allow any user to receive the broadcast information. 3,4 This is because most broadcast environments allow any user to receive the broadcast information.…”
Section: Introductionmentioning
confidence: 99%
“…With the increasing popularity of group-oriented applications 1,2 such as broadcast transmission systems, there is a growing demand for security services to achieve secure group communication. 3,4 This is because most broadcast environments allow any user to receive the broadcast information. 5,6 A common way to ensure secure group communication is to encrypt the messages using a key, 5 called group key.…”
Section: Introductionmentioning
confidence: 99%