CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
Conference Key Agreement from Secret Sharing
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
A survey on information processing technologies in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
International Journal of Information Security
Authenticated Group Key Transfer Protocol Based on Secret Sharing
IEEE Transactions on Computers
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Ad Hoc and Ubiquitous Computing
New directions in cryptography
IEEE Transactions on Information Theory
A conference key distribution system
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In this paper, we propose a new authenticated group key transfer protocol based on two-layers secret sharing. Our protocol is suitable for the actual network environment, in which there exists a chief server and several sub-servers. The chief server administrates these sub-servers, and each sub-server manages several users. In our protocol, the broadcasted message size is fixed and each group member only needs to compute two small degree interpolating polynomials to recover the group key. Thus, our protocol can be applied for the large size group. Furthermore, we provide authentication for transporting this group key.