• Computer Science
  • Published in Int. J. Communication Systems 2014
  • DOI:10.1002/dac.2569

An authenticated group key distribution mechanism using theory of numbers

@article{Liu2014AnAG,
  title={An authenticated group key distribution mechanism using theory of numbers},
  author={Yanjun Liu and Lein Harn and Chin-Chen Chang},
  journal={Int. J. Communication Systems},
  year={2014},
  volume={27},
  pages={3502-3512}
}
A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In 2010, Harn and Lin proposed an authenticated group key distribution protocol using polynomial-based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese remainder theorem. In this paper, we point out that there are some security problems of Guo and Chang's protocol and propose a simpler authenticated group key… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 12 CITATIONS

Secure and Efficient Dealing with Node Capture Attack in Wireless Sensor Networks

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS

An Integratable Verifiable Secret Sharing Mechanism

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS

Node revocation and key update protocol in wireless sensor networks

  • Sarita Agrawal, Manik Lal Das
  • Computer Science
  • 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

Group Authentication and Group Key Distribution for Ad Hoc Networks

VIEW 2 EXCERPTS
CITES BACKGROUND

Group Key Agreement in Multimedia Service for Machine Type Communication

VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 26 REFERENCES

Parallel computational algorithms for generalized Chinese remainder theorem

VIEW 8 EXCERPTS

A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers

VIEW 7 EXCERPTS

Authenticated Group Key Transfer Protocol Based on Secret Sharing

VIEW 4 EXCERPTS

A new authenticated key agreement for session initiation protocol

  • Qi Xie
  • Computer Science
  • Int. J. Communication Systems
  • 2012

Space efficient secret sharing for implicit data security

VIEW 1 EXCERPT