{"id":"https://openalex.org/W3052548032","doi":"https://doi.org/10.1109/lcomm.2020.3017660","title":"The Group Key Agreement Protocol Based on Multi-Dimensional Virtual Permutation","display_name":"The Group Key Agreement Protocol Based on Multi-Dimensional Virtual Permutation","publication_year":2020,"publication_date":"2020-08-18","ids":{"openalex":"https://openalex.org/W3052548032","doi":"https://doi.org/10.1109/lcomm.2020.3017660","mag":"3052548032"},"language":"en","primary_location":{"id":"doi:10.1109/lcomm.2020.3017660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2020.3017660","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054921672","display_name":"Yifeng Yin","orcid":"https://orcid.org/0000-0002-2271-5109"},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifeng Yin","raw_affiliation_strings":["School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100786543","display_name":"Kunpeng Liu","orcid":"https://orcid.org/0000-0001-9416-0096"},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunpeng Liu","raw_affiliation_strings":["School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020869491","display_name":"Chaofei Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaofei Hu","raw_affiliation_strings":["School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101591422","display_name":"Yong Gan","orcid":"https://orcid.org/0000-0003-3231-5528"},"institutions":[{"id":"https://openalex.org/I4210091712","display_name":"Zhengzhou University of Science and Technology","ror":"https://ror.org/00b3j7936","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210091712"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Gan","raw_affiliation_strings":["Zhengzhou Institute of Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Institute of Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210091712"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054921672"],"corresponding_institution_ids":["https://openalex.org/I23171815"],"apc_list":null,"apc_paid":null,"fwci":0.3083,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6084665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"24","issue":"12","first_page":"2728","last_page":"2732"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6685963273048401},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5776712894439697},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5654508471488953},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5479269027709961},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.481916218996048},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.4629339575767517},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4580385684967041},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40533173084259033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2142300009727478},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13159090280532837},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08645930886268616}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6685963273048401},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5776712894439697},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5654508471488953},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5479269027709961},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.481916218996048},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.4629339575767517},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4580385684967041},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40533173084259033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2142300009727478},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13159090280532837},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08645930886268616},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcomm.2020.3017660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2020.3017660","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3291271152","display_name":null,"funder_award_id":"U1804263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3894998447","display_name":null,"funder_award_id":"61572445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8026148376","display_name":null,"funder_award_id":"61272038","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2020797783","https://openalex.org/W2056521200","https://openalex.org/W2301424859","https://openalex.org/W2367591588","https://openalex.org/W2557014197","https://openalex.org/W2770497041","https://openalex.org/W2789751194","https://openalex.org/W2790159645","https://openalex.org/W2921023459","https://openalex.org/W2964680982","https://openalex.org/W2979513187","https://openalex.org/W2997376238","https://openalex.org/W3000438444","https://openalex.org/W3010887230"],"related_works":["https://openalex.org/W2512634727","https://openalex.org/W1997854497","https://openalex.org/W2099222124","https://openalex.org/W2402462207","https://openalex.org/W3150329590","https://openalex.org/W1870242941","https://openalex.org/W3030337379","https://openalex.org/W4386851641","https://openalex.org/W2184427470","https://openalex.org/W1551618647"],"abstract_inverted_index":{"In":[0],"current":[1],"network":[2],"environment,":[3],"it":[4],"is":[5,42],"difficult":[6],"to":[7,14,28,91],"determine":[8],"a":[9,26,30,37,85],"completely":[10],"trusted":[11,38],"third":[12,39],"party":[13],"achieve":[15],"secure":[16,31],"key":[17,108],"distribution.":[18],"To":[19],"solve":[20],"this":[21,23,119],"problem,":[22],"article":[24],"proposes":[25],"method":[27],"build":[29],"communication":[32,35],"channel":[33],"for":[34,44,78,105],"without":[36],"party.":[40],"It":[41,82],"suitable":[43],"the":[45,69,76,92,106,122],"environment":[46],"with":[47],"wide":[48],"distribution,":[49],"limited":[50],"computing":[51],"power":[52],"and":[53,72,102,124],"storage":[54],"capacity,":[55],"such":[56],"as":[57],"intelligent":[58],"terminal":[59],"sensor":[60],"network.":[61],"This":[62],"letter":[63],"realizes":[64],"multi-dimensional":[65,113],"virtual":[66,79,114],"permutation,":[67],"designs":[68],"security":[70,93,100,123],"model":[71],"detailed":[73],"process":[74],"of":[75,88],"protocol":[77,110,120],"permutation":[80],"function.":[81],"can":[83],"generate":[84],"large":[86],"number":[87],"keys":[89],"conforming":[90],"rules":[94],"quickly.":[95],"Then":[96],"we":[97],"carry":[98],"out":[99],"analysis":[101],"performance":[103],"evaluation":[104],"group":[107],"agreement":[109],"based":[111],"on":[112],"permutation.":[115],"The":[116],"result":[117],"shows":[118],"improves":[121],"efficiency.":[125]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
