{"id":"https://openalex.org/W2805267405","doi":"https://doi.org/10.1145/3205977.3205985","title":"Independent Key Distribution Protocols for Broadcast Authentication","display_name":"Independent Key Distribution Protocols for Broadcast Authentication","publication_year":2018,"publication_date":"2018-06-07","ids":{"openalex":"https://openalex.org/W2805267405","doi":"https://doi.org/10.1145/3205977.3205985","mag":"2805267405"},"language":"en","primary_location":{"id":"doi:10.1145/3205977.3205985","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205985","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205985","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205985","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026447333","display_name":"Bruhadeshwar Bezawada","orcid":"https://orcid.org/0000-0002-1021-8121"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bruhadeshawr Bezawada","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072787717","display_name":"Sandeep S. Kulkarni","orcid":"https://orcid.org/0000-0002-7608-2116"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandeep Kulkarni","raw_affiliation_strings":["Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102938076","display_name":"Indrajit Ray","orcid":"https://orcid.org/0000-0002-3612-7738"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrajit Ray","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008904412","display_name":"Indrakshi Ray","orcid":"https://orcid.org/0000-0002-0714-7676"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrakshi Ray","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100448525","display_name":"Rui Li","orcid":"https://orcid.org/0000-0002-6939-7355"},"institutions":[{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Li","raw_affiliation_strings":["Dongguan University of Technology, Dongguan, China"],"affiliations":[{"raw_affiliation_string":"Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026447333"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63019547,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.745789647102356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5959526300430298},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4589155614376068},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4419105648994446},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.39228296279907227},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35735881328582764},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3447760343551636},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23945802450180054},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.15231487154960632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13216620683670044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745789647102356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5959526300430298},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4589155614376068},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4419105648994446},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.39228296279907227},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35735881328582764},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3447760343551636},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23945802450180054},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.15231487154960632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13216620683670044},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3205977.3205985","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205985","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205985","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3205977.3205985","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205985","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205985","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1230246926","display_name":null,"funder_award_id":"61672156","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5211709974","display_name":null,"funder_award_id":"CNS 1650573","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2805267405.pdf","grobid_xml":"https://content.openalex.org/works/W2805267405.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W82773979","https://openalex.org/W113735772","https://openalex.org/W247800214","https://openalex.org/W293279915","https://openalex.org/W1499073821","https://openalex.org/W1529909807","https://openalex.org/W1551235656","https://openalex.org/W1595144095","https://openalex.org/W1762017652","https://openalex.org/W1872753688","https://openalex.org/W1956043843","https://openalex.org/W1975938601","https://openalex.org/W1975996349","https://openalex.org/W1981331847","https://openalex.org/W1984179204","https://openalex.org/W1984894193","https://openalex.org/W2003544295","https://openalex.org/W2008102763","https://openalex.org/W2016898589","https://openalex.org/W2019267322","https://openalex.org/W2037515303","https://openalex.org/W2068843130","https://openalex.org/W2069519268","https://openalex.org/W2080765376","https://openalex.org/W2090388266","https://openalex.org/W2093678351","https://openalex.org/W2104927807","https://openalex.org/W2110081058","https://openalex.org/W2115147656","https://openalex.org/W2116090163","https://openalex.org/W2116269350","https://openalex.org/W2117889403","https://openalex.org/W2121352616","https://openalex.org/W2121802230","https://openalex.org/W2128521639","https://openalex.org/W2136086412","https://openalex.org/W2139018150","https://openalex.org/W2140327371","https://openalex.org/W2140372921","https://openalex.org/W2152475146","https://openalex.org/W2153823724","https://openalex.org/W2171829409","https://openalex.org/W2172467705","https://openalex.org/W2294683399","https://openalex.org/W2480837754","https://openalex.org/W2604623014","https://openalex.org/W2615210963","https://openalex.org/W2730879255","https://openalex.org/W2734421624","https://openalex.org/W2734531875","https://openalex.org/W2781218363","https://openalex.org/W2949170220","https://openalex.org/W2949541804","https://openalex.org/W3026954329","https://openalex.org/W3122401678","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2358580169","https://openalex.org/W2111347279","https://openalex.org/W4399426197","https://openalex.org/W2487211728","https://openalex.org/W2378096925","https://openalex.org/W2373539721"],"abstract_inverted_index":{"Broadcast":[0],"authentication":[1],"is":[2,67,76,127,177],"an":[3],"important":[4],"problem":[5,22],"in":[6,34,98],"several":[7,82],"network":[8,70],"settings":[9],"such":[10],"as":[11,91],"wireless":[12,225],"sensor":[13,226],"networks":[14],"and":[15,59,154,173,200,206],"ad-hoc":[16],"networks.":[17,227],"We":[18,42,123,165,189],"focus":[19,43],"on":[20,44,132,142,210],"the":[21,68,93,99,114,128,133,202,211,218],"of":[23,47,95,135,194,197,213,221],"independent":[24],"key":[25,32,149,162],"distribution":[26,150,163],"protocols,":[27],"which":[28],"use":[29],"efficient":[30,148],"symmetric":[31],"signatures":[33],"distributed":[35],"systems":[36],"to":[37,81,103,107,160,179],"permit":[38],"(local)":[39],"broadcast":[40,79],"authentication.":[41],"five":[45],"types":[46],"communication":[48],"graphs:":[49],"(1)":[50],"star,":[51],"(2)":[52],"acyclic,":[53,152],"(3)":[54],"planar,":[55,153],"(4)":[56],"complete":[57,155],"bipartite,":[58],"(5)":[60],"fully":[61,170],"connected":[62,171],"graphs.":[63],"A":[64],"star":[65,86,100,139],"graph":[66],"simplest":[69],"topology":[71],"where":[72,187],"a":[73,138,191],"central":[74],"node":[75,186],"transmitting":[77],"authenticated":[78],"messages":[80],"satellite":[83,96],"nodes.":[84],"For":[85],"graphs,":[87,157],"we":[88,145,216],"show":[89,174,201],"that":[90,125,175],"n,":[92],"number":[94,134],"nodes":[97],"network,":[101],"tends":[102],"infinity,":[104],"it":[105,176],"suffices":[106],"maintain":[108],"logn+1/2loglogn":[109,118],"+":[110],"1":[111],"keys":[112,119,136,184],"at":[113],"center":[115],"node,":[116],"but":[117],"do":[120],"not":[121],"suffice.":[122],"establish":[124],"this":[126,143],"optimal":[129],"lower":[130],"bound":[131],"for":[137,151,169,224],"graph.":[140],"Building":[141],"result,":[144],"describe":[146],"storage":[147],"bipartite":[156],"when":[158],"compared":[159],"existing":[161],"schemes.":[164],"extend":[166],"our":[167,198,222],"scheme":[168],"graphs":[172],"sufficient":[178],"store":[180],"O(c":[181],"log2":[182],"N)":[183],"per":[185],"c<1.":[188],"perform":[190],"detailed":[192],"analysis":[193],"collusion":[195],"resistance":[196],"protocols":[199,223],"trade-offs":[203],"against":[204],"internal":[205],"external":[207],"attacks":[208],"depending":[209],"size":[212],"storage.":[214],"Finally,":[215],"demonstrate":[217],"practical":[219],"applicability":[220]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
