[HTML][HTML] A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

V Kumar, R Kumar, SK Pandey - Journal of King Saud University-Computer …, 2020 - Elsevier
… So, the design of an efficient and secure key management … public key cryptosystem based
centralized key distribution protocolprotocol provides an efficient way to generate a common

Centralized key distribution protocol using identity-based encryption techniques in cloud computing environments

S Ambika, AS Anakath, S Rajakumar… - … Data Management for …, 2023 - taylorfrancis.com
… so that whenever a user joins or leaves the group it can be easily encrypted in the cipher
text based on the greatest common divisor. Our research concern is on the identity to make it …

ALMS: Asymmetric lightweight centralized group key management protocol for VANETs

A Mansour, KM Malik, A Alkaff… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… While the centralized approach relies on high centralized … a centralized symmetric group
key distribution protocol based … An integer d is the greatest common divisor of a, b if it is a …

Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments

V Kumar, K Gupta, O Pal, R Kumar… - Cyber security using …, 2023 - taylorfrancis.com
key delivery method using the modulo inverse function. Kumar [23] introduced a decentralized
and highly scalable key distribution technique … calculate Greatest Common Divisor (GCD) …

[PDF][PDF] Cost Effective Decentralized Key Management Framework for IoT.

R Lavanya, K Sundarakantham… - … Systems Science & …, 2022 - researchgate.net
key generation and the key distribution phase involves the multicast–unicast approach for
sharing their private keys and group keyscentralized key management scheme, a centralized

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

P Vijayakumar, M Azees, V Chang, J Deborah… - cluster computing, 2017 - Springer
… workload during the computation of the common group key based on the use of CRT for ‘n’ …
[37] proposed a key distribution protocol based on the use of Greatest Common Divisor (GCD)…

Fully device independent quantum key distribution

U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
… This central question dates back to the early 1990s when the challenge of achieving Device-…
proposal for quantum key distribution. The proof of security builds on techniques from the …

The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication

Q Chen, F Miao - 2022 8th International Conference on Big …, 2022 - ieeexplore.ieee.org
key graphs, but it increases computational complexity. Two-dimension key distribution protocol
based on maximum common divisor … scheme, the process of key distribution and recovery …

Group Key Management using Asynchronous Cipher System Based on XOR Vector Space and Pseudo Random Number Generation for Fog Environment.

RK HS, G Aithal, S Shetty - International Journal on …, 2023 - search.ebscohost.com
… Kannan, “Centralized key distribution protocol using the greatest common divisor method”, …
Kannan, “Chinese remainder theorem based centralised group key management for secure …

PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs)

P Sahu, V Kumar, K Gupta, R Prakash - Multimedia Tools and Applications, 2024 - Springer
key distribution protocol eliminates the rekeying process ie, … efficient centralized group key
distribution scheme for secure … and \({S}_{i}\) have a greatest common divisor of 1, and \({S}_{i}\…