{"id":"https://openalex.org/W2952439975","doi":"https://doi.org/10.1145/3318460","title":"A Survey of Group Key Agreement Protocols with Constant Rounds","display_name":"A Survey of Group Key Agreement Protocols with Constant Rounds","publication_year":2019,"publication_date":"2019-06-18","ids":{"openalex":"https://openalex.org/W2952439975","doi":"https://doi.org/10.1145/3318460","mag":"2952439975"},"language":"en","primary_location":{"id":"doi:10.1145/3318460","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3318460","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043499847","display_name":"Yan Wu","orcid":"https://orcid.org/0000-0003-4441-7230"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Wu","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101457170","display_name":"Zhenyu Lu","orcid":"https://orcid.org/0000-0001-7157-9943"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenyu Lu","raw_affiliation_strings":["Sichuan Electric Power Design 8 Consulting Company, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Sichuan Electric Power Design 8 Consulting Company, Sichuan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100643589"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":2.4757,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.90049465,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"52","issue":"3","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8165862560272217},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6446898579597473},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.6271259784698486},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.604692816734314},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.5479065775871277},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.50526362657547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4383930563926697},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.42602983117103577},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14615517854690552},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11227878928184509}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8165862560272217},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6446898579597473},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.6271259784698486},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.604692816734314},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.5479065775871277},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.50526362657547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4383930563926697},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.42602983117103577},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14615517854690552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11227878928184509},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3318460","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3318460","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2887483957","display_name":null,"funder_award_id":"ZYGX2016J091","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4057253406","display_name":null,"funder_award_id":"U1401257, 61472064, and 61602096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W189397779","https://openalex.org/W1482965486","https://openalex.org/W1484417539","https://openalex.org/W1490838413","https://openalex.org/W1492902541","https://openalex.org/W1504634919","https://openalex.org/W1513478504","https://openalex.org/W1520096918","https://openalex.org/W1532836984","https://openalex.org/W1535945812","https://openalex.org/W1537090015","https://openalex.org/W1545843592","https://openalex.org/W1552776858","https://openalex.org/W1587927411","https://openalex.org/W1601218083","https://openalex.org/W1603356866","https://openalex.org/W1709517452","https://openalex.org/W1758159151","https://openalex.org/W1858700764","https://openalex.org/W1969480928","https://openalex.org/W1977251372","https://openalex.org/W1982833480","https://openalex.org/W1986920793","https://openalex.org/W1987568033","https://openalex.org/W1990442702","https://openalex.org/W1994926295","https://openalex.org/W1996876766","https://openalex.org/W2007025866","https://openalex.org/W2012168171","https://openalex.org/W2012282732","https://openalex.org/W2019376654","https://openalex.org/W2020750380","https://openalex.org/W2036126441","https://openalex.org/W2049088527","https://openalex.org/W2050322947","https://openalex.org/W2055096528","https://openalex.org/W2056521200","https://openalex.org/W2059210531","https://openalex.org/W2063100995","https://openalex.org/W2064608844","https://openalex.org/W2082969166","https://openalex.org/W2086415583","https://openalex.org/W2090026504","https://openalex.org/W2095841131","https://openalex.org/W2102091280","https://openalex.org/W2112739182","https://openalex.org/W2117307660","https://openalex.org/W2124311676","https://openalex.org/W2131123432","https://openalex.org/W2135042651","https://openalex.org/W2135105353","https://openalex.org/W2140626418","https://openalex.org/W2148717592","https://openalex.org/W2154052525","https://openalex.org/W2156186849","https://openalex.org/W2157875888","https://openalex.org/W2158347562","https://openalex.org/W2165265664","https://openalex.org/W2195423816","https://openalex.org/W2201179787","https://openalex.org/W2346415545","https://openalex.org/W2400291436","https://openalex.org/W2464507173","https://openalex.org/W2465052902","https://openalex.org/W2625752091","https://openalex.org/W2950784951","https://openalex.org/W4244138246"],"related_works":["https://openalex.org/W1492293731","https://openalex.org/W1579844559","https://openalex.org/W3029861272","https://openalex.org/W2765998650","https://openalex.org/W2105539324","https://openalex.org/W2545291100","https://openalex.org/W1581949462","https://openalex.org/W4240926962","https://openalex.org/W1969397765","https://openalex.org/W4241370368"],"abstract_inverted_index":{"Group":[0],"key":[1,17,27],"agreement":[2],"(shorten":[3],"as":[4],"GKA)":[5],"protocol":[6],"enables":[7],"a":[8,14,87,161],"group":[9,50],"of":[10,34,39,49,72,77,89,105,108,130,142,163],"users":[11],"to":[12,58,66,91],"negotiate":[13],"one-time":[15],"session":[16,26],"and":[18,75,97,120,123,132,152],"protect":[19],"the":[20,40,47,103,106,114,118,140],"thereafter":[21],"group-oriented":[22],"communication":[23,35],"with":[24],"this":[25,81,100,137,156],"across":[28],"an":[29],"unreliable":[30],"network.":[31],"The":[32],"number":[33,162],"rounds":[36,62],"is":[37,53,56],"one":[38],"main":[41],"concern":[42],"for":[43,95],"practical":[44],"applications":[45],"where":[46],"cardinality":[48],"participants":[51],"involved":[52],"considerable.":[54],"It":[55],"critical":[57],"have":[59],"fixed":[60],"constant":[61],"in":[63,128],"GKA":[64,79,110,144],"protocols":[65,85,111,127,145],"secure":[67],"these":[68,84],"applications.":[69],"In":[70,135,154],"light":[71],"overwhelming":[73],"variety":[74],"multitude":[76],"constant-round":[78,109,143],"protocols,":[80],"article":[82,101,138,157],"surveys":[83],"from":[86],"series":[88],"perspectives":[90],"supply":[92],"better":[93],"comprehension":[94],"researchers":[96],"scholars.":[98],"Concretely,":[99],"captures":[102],"state":[104],"art":[107],"by":[112],"analyzing":[113],"design":[115],"rationale,":[116],"examining":[117],"framework":[119],"security":[121,133],"model,":[122],"evaluating":[124],"all":[125],"discussed":[126],"terms":[129],"efficiency":[131],"properties.":[134],"addition,":[136],"discusses":[139],"extension":[141],"including":[146],"dynamic":[147],"membership":[148],"updating,":[149],"password-based,":[150],"affiliation-hiding,":[151],"fault-tolerance.":[153],"conclusion,":[155],"also":[158],"points":[159],"out":[160],"interesting":[164],"future":[165],"directions.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
