2010
DOI: 10.1109/tc.2010.40
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Group Key Transfer Protocol Based on Secret Sharing

Abstract: Abstract-Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key;… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
102
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 148 publications
(102 citation statements)
references
References 28 publications
(29 reference statements)
0
102
0
Order By: Relevance
“…In centralized group key management protocols, a group KGC is engaged in managing the entire group. The class of centralized group key management protocols is the most widely used group key management protocols, such as those in [1][2][3][4]14,15]. In distributed group key management protocols, there is no explicit group key distribution center, and each group member can contribute to the key generation and distribution.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…In centralized group key management protocols, a group KGC is engaged in managing the entire group. The class of centralized group key management protocols is the most widely used group key management protocols, such as those in [1][2][3][4]14,15]. In distributed group key management protocols, there is no explicit group key distribution center, and each group member can contribute to the key generation and distribution.…”
Section: Introductionmentioning
confidence: 99%
“…There are two types of group key distribution protocols: one assumes a trusted offline server, which is active only at initialization [11,12], and the other assumes a trusted server, which is always active [12][13][14][15][16]. The first type of approach is also called the key predistribution scheme.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This scheme also doesn't provide secure communication between the sink node and cluster heads. Based on Shamir's (t, n) secret sharing (SS), Harn and Lin (2010) [35] proposed an authenticated group key distribution protocol. This scheme need a key generation center to construct and transfer the group key which increases the overhead required for the system implementation.…”
Section: Related Workmentioning
confidence: 99%