{"id":"https://openalex.org/W2519317557","doi":"https://doi.org/10.1093/comjnl/bxw061","title":"On the (In)Security of Recent Group Key Distribution Protocols","display_name":"On the (In)Security of Recent Group Key Distribution Protocols","publication_year":2016,"publication_date":"2016-09-12","ids":{"openalex":"https://openalex.org/W2519317557","doi":"https://doi.org/10.1093/comjnl/bxw061","mag":"2519317557"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxw061","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxw061","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100375136","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0003-4690-1886"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Liu","raw_affiliation_strings":["School of Software, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101539462","display_name":"Yunyun Wu","orcid":"https://orcid.org/0000-0002-6232-1729"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunyun Wu","raw_affiliation_strings":["School of Information Science and Engineering, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101671509","display_name":"Xuezheng Liu","orcid":"https://orcid.org/0000-0001-9383-1249"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuezheng Liu","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045752561","display_name":"Yunchun Zhang","orcid":"https://orcid.org/0000-0001-9738-4802"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunchun Zhang","raw_affiliation_strings":["School of Software, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101402230","display_name":"Gang Xue","orcid":"https://orcid.org/0000-0001-6555-2269"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xue","raw_affiliation_strings":["School of Software, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051349066","display_name":"Wei Zhou","orcid":"https://orcid.org/0000-0002-5881-9436"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhou","raw_affiliation_strings":["School of Software, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000436275","display_name":"Shaowen Yao","orcid":"https://orcid.org/0000-0003-1516-4246"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaowen Yao","raw_affiliation_strings":["School of Software, Yunnan University, Kunming 650091, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming 650091, China","institution_ids":["https://openalex.org/I189210763"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100375136"],"corresponding_institution_ids":["https://openalex.org/I189210763"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.911,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78717205,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.8608288764953613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.788388192653656},{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.7614085674285889},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.6247575879096985},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47933468222618103},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44594186544418335},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4405602216720581},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3705567717552185},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35469281673431396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3466901183128357},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.19907385110855103},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1206902265548706}],"concepts":[{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.8608288764953613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.788388192653656},{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.7614085674285889},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.6247575879096985},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47933468222618103},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44594186544418335},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4405602216720581},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3705567717552185},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35469281673431396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3466901183128357},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.19907385110855103},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1206902265548706},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxw061","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxw061","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W59663849","https://openalex.org/W69351110","https://openalex.org/W80055335","https://openalex.org/W129851343","https://openalex.org/W135467536","https://openalex.org/W141789587","https://openalex.org/W183660802","https://openalex.org/W406408351","https://openalex.org/W1522268755","https://openalex.org/W1532776520","https://openalex.org/W1604998225","https://openalex.org/W1806049065","https://openalex.org/W1905774212","https://openalex.org/W1971166148","https://openalex.org/W1973452640","https://openalex.org/W1976005800","https://openalex.org/W1976767440","https://openalex.org/W1980901365","https://openalex.org/W1996720066","https://openalex.org/W2001225013","https://openalex.org/W2003744102","https://openalex.org/W2018094844","https://openalex.org/W2019267322","https://openalex.org/W2037515303","https://openalex.org/W2040325382","https://openalex.org/W2042159692","https://openalex.org/W2058905207","https://openalex.org/W2064967060","https://openalex.org/W2071470557","https://openalex.org/W2081627969","https://openalex.org/W2098452158","https://openalex.org/W2099111195","https://openalex.org/W2100632096","https://openalex.org/W2103610147","https://openalex.org/W2108072891","https://openalex.org/W2118357205","https://openalex.org/W2123274186","https://openalex.org/W2127234174","https://openalex.org/W2134087349","https://openalex.org/W2141420453","https://openalex.org/W2154396896","https://openalex.org/W2164052311","https://openalex.org/W2165482045","https://openalex.org/W2167718352","https://openalex.org/W2168571148","https://openalex.org/W2171574715","https://openalex.org/W2186247005","https://openalex.org/W2914756988","https://openalex.org/W3141878446","https://openalex.org/W4238634196","https://openalex.org/W6605358435","https://openalex.org/W6614031684"],"related_works":["https://openalex.org/W2382340710","https://openalex.org/W2954239293","https://openalex.org/W2992184512","https://openalex.org/W1603247955","https://openalex.org/W4285503296","https://openalex.org/W2120370036","https://openalex.org/W2096635140","https://openalex.org/W2139460447","https://openalex.org/W3091112164","https://openalex.org/W4328027277"],"abstract_inverted_index":{"A":[0,73],"typical":[1],"stateful":[2,18,48],"(resp.":[3,22],"stateless)":[4],"group":[5,25,82,105],"key":[6],"distribution":[7],"(GKD)":[8],"protocol":[9,111,158],"is":[10,150,160],"composed":[11],"of":[12,33,75,85,88,108,132,190],"a":[13,23,86,126,133],"secret":[14,66,136],"assignment":[15,67],"algorithm,":[16],"and":[17,78,112,164],"join/leave":[19],"rekeying":[20,26,71,83,106],"algorithms":[21,35,68,84,107],"stateless":[24,81,104,141,156,171],"algorithm).":[27],"Any":[28],"design":[29,153],"flaw":[30],"in":[31,64,196],"any":[32],"these":[34],"could":[36],"lead":[37],"to":[38,61,152,176,182],"attacks":[39,59,77],"on":[40,52,80,92,129],"GKD":[41,49,89,142,157,172],"protocols.":[42,143],"We":[43,101],"show":[44,102],"how":[45],"two":[46],"recently-proposed":[47],"protocols":[50,90,173],"based":[51,91],"asymmetric":[53],"cryptographic":[54],"primitives":[55],"suffer":[56,119],"from":[57,120],"collusion":[58],"due":[60],"security":[62,194],"flaws":[63],"either":[65,178],"or":[69,180],"leave":[70],"algorithms.":[72],"variety":[74],"single-user":[76],"improvements":[79],"number":[87],"Shamir's":[93],"Secret-Sharing":[94],"Scheme":[95],"(SSS)":[96],"have":[97],"been":[98],"put":[99],"forward.":[100],"the":[103,130,168,187,192],"one":[109],"improved":[110],"its":[113],"variant":[114],"(proposed":[115],"by":[116],"us)":[117],"still":[118],"attacks.":[121,183],"In":[122],"addition,":[123],"we":[124],"prove":[125],"lower":[127],"bound":[128,145,175],"size":[131],"user's":[134],"long-term":[135],"for":[137],"perfectly":[138,162],"secure":[139,163],"multi-session":[140],"This":[144,184],"reveals":[146],"that":[147,159],"(i)":[148],"it":[149],"impossible":[151],"an":[154],"infinite-session":[155],"both":[161],"practical;":[165],"(ii)":[166],"all":[167],"considered":[169],"SSS-based":[170],"are":[174],"be":[177],"incorrect":[179],"vulnerable":[181],"work":[185],"highlights":[186],"urgent":[188],"necessity":[189],"adopting":[191],"provable":[193],"approach":[195],"this":[197],"research":[198],"field.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
