2012 IEEE 14th International Conference on Communication Technology 2012
DOI: 10.1109/icct.2012.6511309
|View full text |Cite
|
Sign up to set email alerts
|

Chinese Remainder Theorem based DTN group key management

Abstract: Delay Tolerant Network (DTN) has the character of long intermittent connectivity and communication delays, which makes the existing group key management mechanism can not be effectively applied. We proposed a new Chinese Remainder Theorem based group key management mechanism for DTN. Comparing with the early scheme, the existing joined node can derive a new group key from the old group key using hash function in the new user join phase, so the server does not need to broadcast any key update message for the ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…An example for the broadcast secret is the Secure Lock (SL) [6,2] that enables the creation of a group or a re-keying action using a single broadcast message. The SL scheme is based on the Chinese Remainder Theorem (CRT) [25,24], which uses the properties of congruence to encrypt. However, the reduction of communication overhead is obtained by more complex calculations compared to GKMP so that this approach only renders feasible in special scenarios.…”
Section: Cryptographic Key Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…An example for the broadcast secret is the Secure Lock (SL) [6,2] that enables the creation of a group or a re-keying action using a single broadcast message. The SL scheme is based on the Chinese Remainder Theorem (CRT) [25,24], which uses the properties of congruence to encrypt. However, the reduction of communication overhead is obtained by more complex calculations compared to GKMP so that this approach only renders feasible in special scenarios.…”
Section: Cryptographic Key Schemesmentioning
confidence: 99%
“…The GC constructs a CRT congruency in analogy to the SL scheme, so-called Lock MX. Therefore, it uses the individual m i and Key i from all participants of the specified group to calculate the Lock MX to encrypt the GKEK (see CRT calculation [25,24]).…”
Section: Group and Group Key Creationmentioning
confidence: 99%
“…Group key management in DTN has been studied in [11]. The proposed protocol is based on the Chinese Remainder Theorem.…”
Section: Key Management In Dtnsmentioning
confidence: 99%
“…The authors suggest a centralized group key management mechanism of the Logical Key Hierarchy (LKH). Group key management in DTN has been studied in [71]. The proposed protocol is based on the Chinese Remainder Theorem.…”
Section: Group Key Managementmentioning
confidence: 99%