Comments on 'Chinese Remainder Theorembased centralised group key management for secure multicast communication'

Z Xia, Y Yang, F Miao - IET Information Security, 2023 - Wiley Online Library
… In this section, we briefly review Vijayakumar's centralised group key management scheme.
We assume that the readers are familiar with the Chinese Remainder Theorem and we use …

The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication

Q Chen, F Miao - … on Big Data Computing and Communications …, 2022 - ieeexplore.ieee.org
… In most schemes, it is often difficult to balance between security and efficiency. This paper
proposes a centralized group key management scheme, where the session key can be …

SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups

V Kumar, O Pal, V Thakur, K Kumar - International Journal of Information …, 2022 - Springer
key management scheme based on the Chinese remainder … the proposed centralized group
key management scheme in … operation is based on the Chinese Remainder Theorem that …

[HTML][HTML] A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

V Kumar, R Kumar, SK Pandey - Journal of King Saud University-Computer …, 2020 - Elsevier
… In some of the centralized group key management schemes, the KS assigns a private … ,
security assumptions and adversary model, RSA and Chinese remainder theorem cryptosystem …

An efficient and secure ID based asymmetric key management scheme for dynamic groups

MS Rani, R Rekha, KVN Sunitha - … Security and Communication, 2021 - indianjournals.com
group key management protocols from centralized group key management protocols and
traditional symmetric group key … on Chinese Remainder Theorem (CRT) to compute multicast

[HTML][HTML] Group key management scheme for multicast communication fog computing networks

MT Dong, H Xu - Processes, 2020 - mdpi.com
… often fails because multicast communication does not provide reliable linkage. In this
paper, a new group key management scheme is proposed for multicast communication in fog …

A provable secure group key management scheme based on the Chinese remainder theorem and Pohlig-Hellman Exponential Cipher

Y Yun, F Miao, Z Xu - … on Computer Science and Management …, 2023 - dl.acm.org
… two centralized group key management protocols based on CRT. … a centralized group key
management protocol based on the CRT to support dynamic secure multicast communication. …

ALMS: Asymmetric lightweight centralized group key management protocol for VANETs

A Mansour, KM Malik, A Alkaff… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… the ones that are based on Chinese Remainder Theorem (CRT… lightweight multicast scalable
group key management protocol, … on Chinese Remainder Theorem (CRT) [23]: 1) Chinese

[PDF][PDF] Distributed Dynamic Multicast Key Management Scheme Based on Grouped Linked List

L Cao, M Liang, Y Zhang, S Cao - … Journal of Network Security, 2022 - ijns.jalaxy.com.tw
centralized multicast key management schemes are based … the Chinese remainder theorem
for group session key calculation [21… of group users to through the RSA encryption algorithm. …

A typology of secure multicast communication over 5 G/6 G networks

N Din, A Waheed, S Ullah, NU Amin… - … of Information Security, 2023 - Springer
security of multicast communication over 5 G and 6 G networks. In order to ensure the security
and efficacy of multicast communication, … of combining multicast public-key encryption with …