2011
DOI: 10.1587/transinf.e94.d.2069
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications

Abstract: SUMMARYGroup key establishment is an important mechanism to construct a common session key for group communications. Conventional group key establishment protocols use an on-line trusted key generation center (KGC) to transfer the group key for each participant in each session. However, this approach requires that a trusted server be set up, and it incurs communication overhead costs. In this article, we address some security problems and drawbacks associated with existing group key establishment protocols. Be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…ECC is a lightweight public key cryptographic (PKC) solution which is defined with standard curve parameters and suitable for securing constrained devices [10]. In fact the protocol 1 is an ECC variant of reference [11] with improvements (e.g., ensure the integrity and the authenticity of data, and remove the MITM attacks). Protocol 2 is a further optimized variant of the solution in [2], [11], and [12], and an influenced variant of Elliptic Curve Integrated Encryption Scheme (ECIES).…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…ECC is a lightweight public key cryptographic (PKC) solution which is defined with standard curve parameters and suitable for securing constrained devices [10]. In fact the protocol 1 is an ECC variant of reference [11] with improvements (e.g., ensure the integrity and the authenticity of data, and remove the MITM attacks). Protocol 2 is a further optimized variant of the solution in [2], [11], and [12], and an influenced variant of Elliptic Curve Integrated Encryption Scheme (ECIES).…”
Section: Literature Surveymentioning
confidence: 99%
“…In fact the protocol 1 is an ECC variant of reference [11] with improvements (e.g., ensure the integrity and the authenticity of data, and remove the MITM attacks). Protocol 2 is a further optimized variant of the solution in [2], [11], and [12], and an influenced variant of Elliptic Curve Integrated Encryption Scheme (ECIES). ECIES is a hybrid encryption scheme that uses the functions such as key agreement, key derivation, encryption, message authentication, and hash value computation.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the second type of approach, an online server must be active and can distribute group keys to every member of the group. Secret sharing is used for different protocols of WSNs, including group key management, and data confidentiality is required (Harn and Lin, 2010;Lee et al, 2011;Di Pietro and Guarino, 2013). Authenticated group key transfer protocol (AGKTP) introduced in Harn and Lin (2010) requires an online key generation center for constructing and distributing a group-based key.…”
Section: Introductionmentioning
confidence: 99%
“…These keys raise the overhead to construct the system while decreasing the system's flexibility. A method for replicating the keying scheme is explored in Lee et al, (2011), and this method is more active without a trusted server called KGC. In this regard, a group key created is between the trusted members and all the group members for the final key derivate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation