{"id":"https://openalex.org/W1603356866","doi":"https://doi.org/10.1109/tifs.2015.2447933","title":"Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications","display_name":"Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications","publication_year":2015,"publication_date":"2015-06-19","ids":{"openalex":"https://openalex.org/W1603356866","doi":"https://doi.org/10.1109/tifs.2015.2447933","mag":"1603356866"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2447933","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2447933","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/3503036","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101917726","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0001-8786-4562"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","School of Electronics and Information Engineering, Beihang University, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Electronics and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051455237","display_name":"Josep Domingo\u2010Ferrer","orcid":"https://orcid.org/0000-0001-7213-4962"},"institutions":[{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Josep Domingo-Ferrer","raw_affiliation_strings":["Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain","institution_ids":["https://openalex.org/I55952717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111808632","display_name":"Bo Qin","orcid":"https://orcid.org/0000-0001-6015-7788"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Qin","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Beijing, China","Key Laboratory of Data Engineering and Knowledge Engineering, School of Information, Ministry of Education, Renmin University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering, School of Information, Ministry of Education, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044013392","display_name":"Zheming Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheming Dong","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101917726"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":7.7658,"has_fulltext":false,"cited_by_count":66,"citation_normalized_percentile":{"value":0.97232893,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"11","first_page":"2352","last_page":"2364"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.8573262095451355},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7482348084449768},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.6948401927947998},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6622198820114136},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.642989993095398},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5740037560462952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5110222101211548},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.49741509556770325},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46917062997817993},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43021467328071594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41391873359680176},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.4124007225036621},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.35718798637390137},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3540292978286743}],"concepts":[{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.8573262095451355},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7482348084449768},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.6948401927947998},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6622198820114136},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.642989993095398},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5740037560462952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5110222101211548},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.49741509556770325},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46917062997817993},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43021467328071594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41391873359680176},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.4124007225036621},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.35718798637390137},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3540292978286743}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2015.2447933","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2447933","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:zenodo.org:3503036","is_oa":true,"landing_page_url":"https://zenodo.org/record/3503036","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:3503036","is_oa":true,"landing_page_url":"https://zenodo.org/record/3503036","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G1732616428","display_name":null,"funder_award_id":"13JC1403500","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G649317490","display_name":null,"funder_award_id":"2014 SGR537","funder_id":"https://openalex.org/F4320321505","funder_display_name":"Generalitat de Catalunya"}],"funders":[{"id":"https://openalex.org/F4320321505","display_name":"Generalitat de Catalunya","ror":"https://ror.org/01bg62x04"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W209883168","https://openalex.org/W347261784","https://openalex.org/W1482965486","https://openalex.org/W1492902541","https://openalex.org/W1502577962","https://openalex.org/W1537090015","https://openalex.org/W1542059364","https://openalex.org/W1607264302","https://openalex.org/W1806049065","https://openalex.org/W1978122865","https://openalex.org/W2012168171","https://openalex.org/W2032547610","https://openalex.org/W2045971176","https://openalex.org/W2050322947","https://openalex.org/W2068425466","https://openalex.org/W2076965705","https://openalex.org/W2104748480","https://openalex.org/W2116556172","https://openalex.org/W2134105200","https://openalex.org/W2143854845","https://openalex.org/W2397835572","https://openalex.org/W2914756988","https://openalex.org/W3030849521","https://openalex.org/W4238634196","https://openalex.org/W6601021267","https://openalex.org/W6628982038","https://openalex.org/W6632069614","https://openalex.org/W6636380913","https://openalex.org/W6677607623","https://openalex.org/W6680029444","https://openalex.org/W6778672391"],"related_works":["https://openalex.org/W2161971476","https://openalex.org/W2915550258","https://openalex.org/W2134637773","https://openalex.org/W2031197620","https://openalex.org/W1551235656","https://openalex.org/W3174772455","https://openalex.org/W3008918367","https://openalex.org/W2354377965","https://openalex.org/W3143198484","https://openalex.org/W4244478652"],"abstract_inverted_index":{"Modern":[0],"collaborative":[1,43],"and":[2,44,64],"group-oriented":[3,45],"applications":[4],"typically":[5],"involve":[6],"communications":[7,17,40],"over":[8],"open":[9],"networks.":[10],"Given":[11],"the":[12,26,50,110,119,125,151],"openness":[13],"of":[14,52,86],"today's":[15],"networks,":[16],"among":[18],"group":[19,39,85,93,111,120],"members":[20,87,121,126],"must":[21],"be":[22,148],"secure":[23,38,66,149],"and,":[24],"at":[25],"same":[27],"time,":[28],"efficient.":[29],"Group":[30],"key":[31,67,104],"agreement":[32],"(GKA)":[33],"is":[34,72,145],"widely":[35],"employed":[36],"for":[37],"in":[41,54,105],"modern":[42],"applications.":[46],"This":[47],"paper":[48],"studies":[49],"problem":[51,71],"GKA":[53,80],"identity-based":[55,107,138],"cryptosystems":[56],"with":[57,133],"an":[58,106],"emphasis":[59],"on":[60],"round-efficient,":[61],"sender-unrestricted,":[62],"member-dynamic,":[63],"provably":[65],"escrow":[68],"freeness.":[69],"The":[70,142],"resolved":[73],"by":[74],"proposing":[75],"a":[76,84,91,100,134],"one-round":[77],"dynamic":[78],"asymmetric":[79],"protocol":[81,132,144],"which":[82],"allows":[83],"to":[88,118,147],"dynamically":[89],"establish":[90],"public":[92],"encryption":[94,112],"key,":[95,113],"while":[96],"each":[97],"member":[98],"has":[99],"different":[101],"secret":[102],"decryption":[103],"cryptosystem.":[108],"Knowing":[109],"any":[114],"entity":[115],"can":[116,127],"encrypt":[117],"so":[122],"that":[123],"only":[124],"decrypt.":[128],"We":[129],"construct":[130],"this":[131],"strongly":[135],"unforgeable":[136],"stateful":[137],"batch":[139],"multisignature":[140],"scheme.":[141],"proposed":[143],"shown":[146],"under":[150],"k":[152],"-bilinear":[153],"Diffie-Hellman":[154],"exponent":[155],"assumption.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
