Polynomial-based key management for secure intra-group and inter-group communication

@article{Yanji2013PolynomialbasedKM,
  title={Polynomial-based key management for secure intra-group and inter-group communication},
  author={Piao Yanji and Jonguk Kim and Usman Tariq and Manpyo Hong},
  journal={Computers & Mathematics with Applications},
  year={2013},
  volume={65},
  pages={1300-1309}
}
Abstract Secure group communication has become an important issue in many applications. Both intra-group and inter-group multicast traffic must be protected by shared secret keys. In order to communicate securely in the same group and among different groups, we employed a polynomial P to achieve efficient intra-group key refreshment and generated a polynomial H ( x ) to create an inter-group key. Proposed polynomial-based key management schemes have the following advantages: (1) Group members… CONTINUE READING
1
Twitter Mention

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Attacks and Comments on Several Recently Proposed Key Management Schemes

  • IACR Cryptology ePrint Archive
  • 2013
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Chameleon: A blind double trapdoor hash function for securing AMI data aggregation

  • 2018 IEEE 4th World Forum on Internet of Things (WF-IoT)
  • 2018
VIEW 2 EXCERPTS
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 35 REFERENCES

Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094

C. H. Harney
  • 1999
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Danamani, A survey on multicast rekeying for secure group communication, International

A.S.S. Devi
  • Journal of Computer Technology and Applications
  • 2011

Secure Communication Using Reed-Muller Codes and Partially Balanced Design in Wireless Sensor Network

  • 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops
  • 2011

Enhancing Network Availability by Tolerance Control in Multi-Sink Wireless Sensor Network

  • 2010 2nd International Conference on Information Technology Convergence and Services
  • 2010
VIEW 1 EXCERPT

A Survey of Group Key Management

  • 2008 International Conference on Computer Science and Software Engineering
  • 2008