2020
DOI: 10.1109/access.2020.3035278
|View full text |Cite
|
Sign up to set email alerts
|

Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir’s SS for 5G Networks

Abstract: Wireless group communications and mobile computing have demonstrated its potential capacity in the next generation of mobile communication networks and wireless systems (5G), where devices have the particularity of being heterogeneous and so have different capabilities in terms of storage, computing, communication and energy. Conventional protocols are not suitable for 5G networks since this environment needs more flexible and simple protocols for secure group communications. Hence, how to realize the dynamica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
0
1
0
1
Order By: Relevance
“…Secret sharing (SS) is computational complexity based on polynomials and unconditional security. Due to its special advantage, it becomes a very popular tool to design group key establishment protocols and then many types of SS are proposed, such as dynamic threshold SS [14]. A linear secret sharing scheme is designed by Hsu et al [15] using Vandermonde Matrix to effectively generate the group key.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing (SS) is computational complexity based on polynomials and unconditional security. Due to its special advantage, it becomes a very popular tool to design group key establishment protocols and then many types of SS are proposed, such as dynamic threshold SS [14]. A linear secret sharing scheme is designed by Hsu et al [15] using Vandermonde Matrix to effectively generate the group key.…”
Section: Introductionmentioning
confidence: 99%
“…El modelo COBIT (Control Objectives for In-formation and related Technology) es el marco internacional de buenas prácticas para controlar la información de TI y los peligros que conlleva. COBIT se utiliza para llevar a cabo el régimen de TI y mejorar sus controles (Hsu et al, 2020). Así mismo, tiene fines de control, directrices de aseguramiento, mediciones de funcionamiento y resultados, componentes críticos de triunfo y modelos de madurez (Gebremichael et al, 2020).…”
Section: Cobitunclassified