Comments on 'Chinese Remainder Theorembased centralised group key management for secure multicast communication'

Z Xia, Y Yang, F Miao - IET Information Security, 2023 - Wiley Online Library
… In this section, we briefly review Vijayakumar's centralised group key management scheme.
We assume that the readers are familiar with the Chinese Remainder Theorem and we use …

The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication

Q Chen, F Miao - … on Big Data Computing and Communications …, 2022 - ieeexplore.ieee.org
… In most schemes, it is often difficult to balance between security and efficiency. This paper
proposes a centralized group key management scheme, where the session key can be …

Key management in efficient and secure group communication

M Yadav, K Singh, AS Pandey - 2016 International Conference …, 2016 - ieeexplore.ieee.org
… In a multicast communication to secure our communication … a group key management
protocol for centralized dynamic … prime both, we use Chinese Remainder Theorem (CRT) which …

[HTML][HTML] A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

V Kumar, R Kumar, SK Pandey - Journal of King Saud University-Computer …, 2020 - Elsevier
… In some of the centralized group key management schemes, the KS assigns a private … ,
security assumptions and adversary model, RSA and Chinese remainder theorem cryptosystem …

SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups

V Kumar, O Pal, V Thakur, K Kumar - International Journal of Information …, 2022 - Springer
key management scheme based on the Chinese remainder … the proposed centralized group
key management scheme in … operation is based on the Chinese Remainder Theorem that …

An efficient group key agreement protocol for secure P2P communication

P Vijayakumar, R Naresh… - … and Communication …, 2016 - Wiley Online Library
… into two types namely centralized and distributed key management schemes. In the … , a
Chinese remainder theorem (CRT) -based novel distributed group key management protocol is …

Group key management scheme for multicast communication fog computing networks

MT Dong, H Xu - Processes, 2020 - mdpi.com
… often fails because multicast communication does not provide reliable linkage. In this
paper, a new group key management scheme is proposed for multicast communication in fog …

An efficient and secure ID based asymmetric key management scheme for dynamic groups

MS Rani, R Rekha, KVN Sunitha - … Security and Communication, 2021 - indianjournals.com
group key management protocols from centralized group key management protocols and
traditional symmetric group key … on Chinese Remainder Theorem (CRT) to compute multicast

Security analysis of key management schemes based on Chinese remainder theorem under strong active outsider adversary model

BR Purushothama, AP Verma, A Kumar - … Computing and Communications …, 2017 - Springer
key management schemes can be centralized, decentralized or contributory [9]. An efficient
key management … This state of the group is as a result of join of \(u_6\) to the initial multicast

A provable secure group key management scheme based on the Chinese remainder theorem and Pohlig-Hellman Exponential Cipher

Y Yun, F Miao, Z Xu - … on Computer Science and Management …, 2023 - dl.acm.org
… two centralized group key management protocols based on CRT. … a centralized group key
management protocol based on the CRT to support dynamic secure multicast communication. …