2014
DOI: 10.1002/sec.966
|View full text |Cite
|
Sign up to set email alerts
|

Analyses of several recently proposed group key management schemes

Abstract: Designing group key management schemes is a troubled field. In this paper, we review three schemes recently proposed, including Kayam's scheme for groups with hierarchy, Piao's group key management (KM) scheme, Purushothama's group KM schemes. We point out the problems in each scheme. Kayam's scheme is not secure to collusion attack. Piao's group KM scheme is not secure. The hard problem it bases is not really hard, and the way their scheme uses a hard problem is improper. Purushothama's scheme has an unnecess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…They result in the same number of rekeying messages, the same computation cost by each member and by each member, and the number of stored keys by the member. Aside from the general attacks presented in Table 3, several Piao scheme attacks have been proposed in the literature, such as [15] and [13]. Such attacks destroy trust in the polynomial-based key management schemes.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…They result in the same number of rekeying messages, the same computation cost by each member and by each member, and the number of stored keys by the member. Aside from the general attacks presented in Table 3, several Piao scheme attacks have been proposed in the literature, such as [15] and [13]. Such attacks destroy trust in the polynomial-based key management schemes.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…In [16], authors show that Piao et al scheme does not ensure neither backward nor forward secrecy. In [21] authors show that Piao et al is based on a mathematical problem computable within a reasonable amount of resources (time and computation power). An attacker can easily factorize the polynomial over a nite eld and retrieve the private keys of the members, as well as the exchanged secrets.…”
Section: Dbgk [3]mentioning
confidence: 99%
“…We find that the situation is still not very optimistic after our uncompleted investigation. We have found new flaws in schemes proposed recently and a few years ago. We will try to show these problems and analyze the underlying reasons in our series of studies.…”
Section: Introductionmentioning
confidence: 99%