2012
DOI: 10.1002/dac.2348
|View full text |Cite
|
Sign up to set email alerts
|

An authenticated group key distribution protocol based on the generalized Chinese remainder theorem

Abstract: The group key distribution protocol is a mechanism for distributing a group key that is used to encrypt the communication data transmitted in an open group. Recently, a novel group key distribution protocol based on secret sharing was proposed. In their protocol, the group key information is broadcast in an open network environment, and only authorized group members can obtain the group key. However, their protocol requires each group member to broadcast a random challenge to the rest of the group members in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
27
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 29 publications
(27 citation statements)
references
References 24 publications
0
27
0
Order By: Relevance
“…Hence, U i g knows only 1 r , 2 r , … , t r r of the codeword C r from Y r , 1 ≤ r ≤ k, of the broadcast message B . Hence, U i g knows only 1 r , 2 r , … , t r r of the codeword C r from Y r , 1 ≤ r ≤ k, of the broadcast message B .…”
Section: Anywise Backward Secrecymentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, U i g knows only 1 r , 2 r , … , t r r of the codeword C r from Y r , 1 ≤ r ≤ k, of the broadcast message B . Hence, U i g knows only 1 r , 2 r , … , t r r of the codeword C r from Y r , 1 ≤ r ≤ k, of the broadcast message B .…”
Section: Anywise Backward Secrecymentioning
confidence: 99%
“…5,6 A common way to ensure secure group communication is to encrypt the messages using a key, 5 called group key. 1 i. Only the group members with valid keys can have access to the corresponding messages.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The value t is called the threshold value, which determines the minimal number of shares needed to recover the secret s. Any secure (t, n) SS must satisfy two requirements [3], that is, (i) the secret s can be recovered by any t or more than t shares and (ii) the secret s cannot be reconstructed by fewer than t shares. Although most SSs are based on an interpolating polynomial, other kinds of SSs are also researched deeply in scientific publications, especially the ones based on the Chinese Remainder Theorem (CRT) [6][7][8], such as Mignotte's SS scheme [9] and Asmuth-Bloom's SS scheme [10]. Nowadays, SS [3][4][5] has become a prevalent mechanism in the fields of cryptography and information security.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by Harn and Lin's protocol and Guo and Chang's protocol , in this paper, we propose a simple authenticated group key distribution protocol based on the CRT. The contributions of our protocol are listed as follows:We point out some security problems of Guo and Chang's protocol.Our proposed protocol based on the CRT is much simpler than the other two protocols.In our proposed protocol, the group key confidentiality is unconditionally secure, whereas the security of Harn and Lin's protocol relies on the RSA assumption .…”
Section: Introductionmentioning
confidence: 99%