{"id":"https://openalex.org/W4285294353","doi":"https://doi.org/10.1109/tdsc.2022.3189977","title":"Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party","display_name":"Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party","publication_year":2022,"publication_date":"2022-07-12","ids":{"openalex":"https://openalex.org/W4285294353","doi":"https://doi.org/10.1109/tdsc.2022.3189977"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3189977","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3189977","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09827566.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09827566.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003674499","display_name":"Victor Youdom Kemmoe","orcid":"https://orcid.org/0000-0003-1887-6396"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]},{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR","US"],"is_corresponding":true,"raw_author_name":"Victor Youdom Kemmoe","raw_affiliation_strings":["Department of Computer Science, Brown University, Providence, RI, USA","Department of Computer Science and Engineering, Hanyang University, Republic of Korea","Department of Computer Science, Brown University, Providence, RI 02906, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Brown University, Providence, RI, USA","institution_ids":["https://openalex.org/I27804330"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Republic of Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Computer Science, Brown University, Providence, RI 02906, USA","institution_ids":["https://openalex.org/I27804330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078768695","display_name":"Yongseok Kwon","orcid":"https://orcid.org/0000-0002-8202-2793"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]},{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["GB","KR"],"is_corresponding":false,"raw_author_name":"Yongseok Kwon","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea","Department of Electrical and Electronic Engineer-ing, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Electrical and Electronic Engineer-ing, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, University of Bristol, Bristol, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, University of Bristol, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024545505","display_name":"Sunghyun Cho","orcid":"https://orcid.org/0000-0002-1847-6088"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]},{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["GB","KR"],"is_corresponding":false,"raw_author_name":"Sunghyun Cho","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea","Department of Electrical and Electronic Engineer-ing, University of Bristol, Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Electrical and Electronic Engineer-ing, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079998325","display_name":"Junggab Son","orcid":"https://orcid.org/0000-0002-6206-083X"},"institutions":[{"id":"https://openalex.org/I133999245","display_name":"University of Nevada, Las Vegas","ror":"https://ror.org/0406gha72","country_code":"US","type":"education","lineage":["https://openalex.org/I133999245"]},{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junggab Son","raw_affiliation_strings":["Department of Computer Science, University of Nevada, Las Vegas, NV, USA","Department of Computer Science, Brown University, Providence, RI 02906, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Nevada, Las Vegas, NV, USA","institution_ids":["https://openalex.org/I133999245"]},{"raw_affiliation_string":"Department of Computer Science, Brown University, Providence, RI 02906, USA","institution_ids":["https://openalex.org/I27804330"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003674499"],"corresponding_institution_ids":["https://openalex.org/I27804330","https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":1.4194,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8223608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"20","issue":"4","first_page":"3176","last_page":"3193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8386762738227844},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7905722856521606},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5580040812492371},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.5498641729354858},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5419787168502808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4992494583129883},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4852566719055176},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4322356581687927},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4251788854598999},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3991088271141052},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2758631706237793},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.139389306306839}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8386762738227844},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7905722856521606},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5580040812492371},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.5498641729354858},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5419787168502808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4992494583129883},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4852566719055176},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4322356581687927},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4251788854598999},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3991088271141052},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2758631706237793},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.139389306306839},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2022.3189977","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3189977","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09827566.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/60fb7c23-e254-4c76-a484-bffc9ff054f1","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/60fb7c23-e254-4c76-a484-bffc9ff054f1","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kemmoe, V Y, Kwon, Y, Hussain, R, Cho, S & Son, J 2022, 'Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party', IEEE Transactions on Dependable and Secure Computing, pp. 1-18. https://doi.org/10.1109/TDSC.2022.3189977","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:facpubs-7478","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/facpubs/6314","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Articles","raw_type":"text"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:facpubs-7816","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/facpubs/6640","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty and Research Publications","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1109/tdsc.2022.3189977","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3189977","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09827566.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285294353.pdf","grobid_xml":"https://content.openalex.org/works/W4285294353.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1439373405","https://openalex.org/W1534388293","https://openalex.org/W1553083934","https://openalex.org/W1967558780","https://openalex.org/W1994386233","https://openalex.org/W2013699853","https://openalex.org/W2025322090","https://openalex.org/W2041428801","https://openalex.org/W2104956287","https://openalex.org/W2117455301","https://openalex.org/W2151722683","https://openalex.org/W2164090669","https://openalex.org/W2515148583","https://openalex.org/W2522455971","https://openalex.org/W2601330228","https://openalex.org/W2624744148","https://openalex.org/W2735601075","https://openalex.org/W2739845435","https://openalex.org/W2741014554","https://openalex.org/W2790810446","https://openalex.org/W2795242887","https://openalex.org/W2799758613","https://openalex.org/W2884071586","https://openalex.org/W2888916371","https://openalex.org/W2897472319","https://openalex.org/W2969569704","https://openalex.org/W2978912325","https://openalex.org/W2982482325","https://openalex.org/W3109829490","https://openalex.org/W3111842495","https://openalex.org/W3122864121","https://openalex.org/W3127232757","https://openalex.org/W3128745440","https://openalex.org/W3172708600","https://openalex.org/W3211914011","https://openalex.org/W3212103021","https://openalex.org/W6628379065","https://openalex.org/W6660893496","https://openalex.org/W6741928516","https://openalex.org/W6748906305","https://openalex.org/W6769077935","https://openalex.org/W6796971288"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2475541339","https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W99756173","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W4243812570","https://openalex.org/W2915026029"],"abstract_inverted_index":{"Group":[0],"Key":[1],"Exchange":[2],"(GKE)":[3],"is":[4,57,100],"an":[5,151],"important":[6],"tool":[7],"to":[8,38,59,109,123,161,199],"develop":[9],"secure":[10],"multi-user":[11],"applications":[12],"such":[13,52,135],"as":[14,136],"group":[15],"text":[16],"messages,":[17],"ad-hoc":[18],"networks,":[19],"and":[20,79,92,158,167,184],"so":[21],"on.":[22],"Most":[23],"of":[24,114,132,138,172],"the":[25,36,54,63,72,75,111,117,130,163,169,173,194],"currently":[26,76],"deployed":[27],"GKE":[28,66,81,119,153],"schemes":[29,67,82,120],"are":[30,106],"synchronous,":[31],"i.e.,":[32],"they":[33],"require":[34,121],"all":[35,125],"participants":[37,122,203],"be":[39,110],"online":[40],"during":[41],"their":[42],"execution.":[43],"However,":[44],"with":[45,206],"more":[46,200],"battery-powered":[47],"devices":[48,134],"being":[49],"used":[50],"in":[51,71,146],"applications,":[53],"synchronicity":[55],"requirement":[56],"challenging":[58],"fulfill.":[60],"To":[61,94,142],"fill":[62],"gaps,":[64],"asynchronous":[65,78,152],"have":[68],"been":[69],"introduced":[70],"literature.":[73],"Nevertheless,":[74],"available":[77],"synchronous":[80],"rely":[83],"on":[84,98,190],"Trusted":[85],"Third":[86],"Parties":[87],"(TTPs)":[88],"for":[89],"key":[90],"establishment":[91],"management.":[93],"this":[95,147],"end,":[96],"reliance":[97],"TTPs":[99,105],"a":[101,207],"serious":[102],"shortcoming":[103],"since":[104],"well":[107],"known":[108],"single":[112],"point":[113],"failure.":[115],"Furthermore,":[116,175],"existing":[118],"perform":[124],"computations,":[126],"which":[127],"can":[128,197],"degrade":[129],"performance":[131],"resource-constrained":[133],"Internet":[137],"Things":[139],"(IoT)":[140],"devices.":[141],"solve":[143],"these":[144],"problems,":[145],"paper,":[148],"we":[149],"propose":[150],"scheme":[154,178,196],"that":[155,193],"uses":[156],"blockchain":[157],"smart":[159],"contracts":[160],"store":[162],"security":[164],"keys-related":[165],"material":[166],"reduce":[168],"computational":[170],"load":[171],"participants.":[174],"our":[176],"proposed":[177,195],"provides":[179],"Perfect":[180],"Forward":[181],"Secrecy":[182],"(PFS)":[183],"Post-Compromised":[185],"Security":[186],"(PCS).":[187],"Our":[188],"implementation":[189],"Ethereum":[191],"shows":[192],"scale":[198],"than":[201],"100":[202],"when":[204],"combined":[205],"distributed":[208],"storage":[209],"system.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
