The Community for Technology Leaders
RSS Icon
Issue No.11 - Nov. (2013 vol.62)
pp: 2335-2336
Yining Liu , Huazhong University of Science and Technology, Wuhan
Chi Cheng , Wuhan National Laboratory for Optoelectronics, Wuhan
Jianyu Cao , Guilin University of Electronic Technology, Guilin
Tao Jiang , Huazhong University of Science and Technology, Wuhan
To achieve secure group communication, one-time session keys need to be shared among group members in a secure and authenticated manner. In this paper, we propose an improved authenticated key transfer protocol based on Shamir's secret sharing. The proposed protocol achieves key confidentiality due to security of Shamir's secret sharing and provides key authentication by broadcasting a single authentication message to all members. Furthermore, the proposed scheme resists against both insider and outsider attacks.
Protocols, Cryptography, Authentication, Resists, Educational institutions, Broadcasting,authentication, Group key transfer protocol, secret sharing, confidentiality
Yining Liu, Chi Cheng, Jianyu Cao, Tao Jiang, "An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing", IEEE Transactions on Computers, vol.62, no. 11, pp. 2335-2336, Nov. 2013, doi:10.1109/TC.2012.216
[1] G.R. Blakley, "Safeguarding Cryptographic Keys," Proc. Am. Federation of Information Processing Soc., vol. 48, pp. 313-317, 1979.
[2] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
[3] C.H. Li and J. Pieprzyk, "Conference Key Agreement from Secret Sharing," Proc. Fourth Australasian Conf. Information Security and Privacy (ACISP '99), pp. 64-76, 1999.
[4] G. Saze, "Generation of Key Predistribution Schemes Using Secret Sharing Scheme," Discrete Applied Math., vol. 128, pp. 239-249, 2003.
[5] J. Katz and M. Yung, "Scalable Protocols for Authenticated Group Key Exchange," J. Cryptology, vol. 20, pp. 85-113, 2007.
[6] L. Harn and C. Lin, "Authenticated Group Key Transfer Protocol Based on Secret Sharing," IEEE Trans. Computers, vol. 59, no. 6, pp. 842-846, June 2010.
[7] J. Overbey, W. Traves, and J. Wojdylo, "On the Keyspace of the Hill Cipher," Cryptologia, vol. 29, no. 1, pp. 59-72, 2005.
123 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool