Group Key Transfer Protocol Based on Shamir's Secret Sharing 


Vol. 39,  No. 9, pp. 555-560, Sep.  2014


PDF
  Abstract

Recently, there are many researches on sharing group session key for members in a group. Among them, Harn and Lin proposed a scheme based on the Shamir’s group session key and Liu, Cheng, Cao, and Jiang improved it to reduce the specific weakness. Especially, these schemes are based on the finite integer ring to protest the insider attack, in which a valid member can derived another member"s secret using known information. In this paper, it is shown that the finite integer ring implies the failure of the reconstruction of group session key depending on the adopted parameters. We fix this problem and propose new group session key transfer scheme using the Shamir’s secret sharing.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Kim, "Group Key Transfer Protocol Based on Shamir's Secret Sharing," The Journal of Korean Institute of Communications and Information Sciences, vol. 39, no. 9, pp. 555-560, 2014. DOI: .

[ACM Style]

Young-Sik Kim. 2014. Group Key Transfer Protocol Based on Shamir's Secret Sharing. The Journal of Korean Institute of Communications and Information Sciences, 39, 9, (2014), 555-560. DOI: .

[KICS Style]

Young-Sik Kim, "Group Key Transfer Protocol Based on Shamir's Secret Sharing," The Journal of Korean Institute of Communications and Information Sciences, vol. 39, no. 9, pp. 555-560, 9. 2014.