Securing polynomial based group key management scheme against strong active adversary model

P Sharma, BR Purushothama - International Journal of Information …, 2022 - Springer
The literature on group key management focuses solely on the security of schemes under
passive adversary model. But they lack security against a more realistic adversary known as …

Proving the (In) Security of CRT Based Key Management Schemes Under SAOA Model

P Sharma, BR Purushothama - Wireless Personal Communications, 2024 - Springer
There have been several proposed methods in the literature for securely distributing group
keys and managing group dynamics for secure group communications. While these …

[PDF][PDF] Security Analysis of Proxy Cryptography Based Group Key Management Schemes for Dynamic and Wireless Networks Under Active Outsider Attack Model.

SM Patil, P BR - Journal of Information Assurance & Security, 2019 - mirlabs.org
The existing group key management schemes have considered passive adversary model to
show that schemes satisfy forward and backward secrecy requirements. A more pragmatic …

[PDF][PDF] A comparison on broadcast encryption schemes: A new broadcast encryption scheme

H Bodur, R Kara - Advances in Electrical and Computer …, 2020 - researchgate.net
In broadcast communication, the schemes in which encryption methods are employed are
often used to transmit messages from a source to multiple users. There are three types of …

Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game

P Sharma, BR Purushothama - SN Computer Science, 2021 - Springer
In the literature, several group key management (GKM) schemes have been proposed and
reviewed against passive adversary to analyze the important security requirements of …

Group key management schemes under strong active adversary model: a security analysis

SV Sawant, G Pareek, BR Purushothama - Security in Computing and …, 2019 - Springer
A group key management scheme is for a group controller to manage an encryption key for
a collection of users to communicate messages among themselves securely. The presence …