iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/DAC.2569
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T15:12:26Z","timestamp":1721747546000},"reference-count":28,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T00:00:00Z","timestamp":1372896000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2014,11]]},"abstract":"SUMMARY<\/jats:title>A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In 2010, Harn and Lin proposed an authenticated group key distribution protocol using polynomial\u2010based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese remainder theorem. In this paper, we point out that there are some security problems of Guo and Chang's protocol and propose a simpler authenticated group key distribution protocol based on the Chinese remainder theorem. The confidentiality of our proposed protocol is unconditionally secure. Copyright \u00a9 2013 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.2569","type":"journal-article","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T11:22:24Z","timestamp":1372936944000},"page":"3502-3512","source":"Crossref","is-referenced-by-count":12,"title":["An authenticated group key distribution mechanism using theory of numbers"],"prefix":"10.1002","volume":"27","author":[{"given":"Yanjun","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology Anhui University Hefei 230039 China"},{"name":"Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan"}]},{"given":"Lein","family":"Harn","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering University of Missouri\u2010Kansas City Kansas City Missouri 64110\u20102499 USA"}]},{"given":"Chin\u2010Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan"},{"name":"Department of Information Engineering and Computer Science Feng Chia University Taichung 407 Taiwan"}]}],"member":"311","published-online":{"date-parts":[[2013,7,4]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","unstructured":"BoydC.On key agreement and conference key agreement.Proceedings of Second Australasian Conference on Information Security and Privacy Sydney Australia Jul.1997;294\u2013302.","DOI":"10.1007\/BFb0027936"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1265"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0361-5"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"BohliJM.A framework for robust group key agreement.Proceedings of International Conference on Computational Science and Applications(ICCSA'06) Glasgow UK May2006;355\u2013364.","DOI":"10.1007\/11751595_39"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1286"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.872575"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015697.38671.ec"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"e_1_2_7_10_1","unstructured":"PerrigA SongD TygarJD.Elk a new protocol for efficient large group key distribution.Proceedings of IEEE Symposium on Security and Privacy Oakland USA May2001;247\u2013262."},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"ChangCC WuTC ChenCP.The design of a conference key distribution system.Proceedings of Advances in Cryptology\u2010AUSCRYPT'92 Gold Coast Australia LNCS 0718 Dec.1992;459\u2013466.","DOI":"10.1007\/3-540-57220-1_83"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"SteinerM TsudikG WaidnerM.Diffie\u2010Hellman key distribution extended to group communication.Proceedings of Third ACM Conference on Computer and Communication Security(CCS'96) New Delhi India Mar.1996;31\u201337.","DOI":"10.1145\/238168.238182"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_7_14_1","doi-asserted-by":"crossref","unstructured":"BlakleyGR.Safeguarding cryptographic keys.Proceedings of American Federation of Information Processing Societies National Computer Conference New York USA Nov.1979;48:313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_2_7_15_1","doi-asserted-by":"crossref","unstructured":"BerkovitsS.How to broadcast a secret.Proceedings of Eurocrypt'91 Workshop Advances in Cryptology Brighton UK Apr.1991; 547:536\u2013541.","DOI":"10.1007\/3-540-46416-6_50"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90008-2"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"LiCH PieprzykJ.Conference key agreement from secret sharing.Proceedings of the Fourth Australasian Conference Information Security and Privacy(ACISP'99) Wollongong Australia Apr.1999;64\u201376.","DOI":"10.1007\/3-540-48970-3_6"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(02)00448-1"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39466-4_27"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"e_1_2_7_22_1","article-title":"An authenticated group key distribution protocol based on the generalized Chinese remainder theorem","author":"Guo C","year":"2012","journal-title":"International Journal of Communication Systems"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0045-7906(03)00013-2"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223873"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.013"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1004-4132.2011.03.023"},{"issue":"1","key":"e_1_2_7_27_1","first-page":"1","article-title":"A Construction for secret sharing scheme with general access structure","volume":"4","author":"Guo C","year":"2013","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"2","key":"e_1_2_7_28_1","first-page":"110","article-title":"Robust and simple N\u2010party entangled authentication cloud storage protocol based on secret sharing scheme","volume":"4","author":"Zhu H","year":"2013","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_2_7_29_1","article-title":"Group authentication","author":"Harn L","year":"2012","journal-title":"IEEE Transactions on Computers"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.2569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.2569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T21:58:20Z","timestamp":1696543100000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.2569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,4]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["10.1002\/dac.2569"],"URL":"http:\/\/dx.doi.org\/10.1002\/dac.2569","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,4]]}}}