2020
DOI: 10.1007/s11276-020-02449-2
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and flexible key distribution schemes for secure group communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…Harn et al [44] presented a novel design of group key distribution using only the logic exclusive-or (XOR) operation, and demonstrated its applications in various network models. A group key distribution scheme was introduced by [45] for a large size of group communication.…”
Section: B the Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Harn et al [44] presented a novel design of group key distribution using only the logic exclusive-or (XOR) operation, and demonstrated its applications in various network models. A group key distribution scheme was introduced by [45] for a large size of group communication.…”
Section: B the Problemsmentioning
confidence: 99%
“…Tselikis et al [47] proposed an anonymous conference key distribution system, based on the elliptic curves, one-way hash functions and random pseudonyms. However, all the works of [44][45][46][47] introduced neither three-factor nor biometric-based authentication in their schemes. A secure authentication and group key distribution scheme for resource-limited Wireless Body Area Networks (WBANs) was proposed by Tan and Chung [48].…”
Section: B the Problemsmentioning
confidence: 99%
“…Two papers recently published by Harn et al [6,7] propose some very simple key distribution schemes designed to enable two or more parties to establish a shared secret key with the aid of a third party. Unfortunately, as we show, most of the schemes are inherently insecure and all are incompletely specified.…”
Section: Introductionmentioning
confidence: 99%
“…Section 2 provides an introduction to the protocols in question, and sets them in the context of the extensive prior art. This is followed by analyses of the various proposed protocols: Sections 3, 4, 5 and 6 provide analyses of the four protocols in the first paper [7], and Section 7 briefly examines the almost identical protocols in the second paper [6]. Finally, Section 8 concludes the paper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation