{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:28:34Z","timestamp":1764588514869},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11277-024-10925-7","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T15:02:12Z","timestamp":1712588532000},"page":"1299-1321","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model"],"prefix":"10.1007","volume":"134","author":[{"given":"Payal","family":"Sharma","sequence":"first","affiliation":[]},{"given":"B. R.","family":"Purushothama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,8]]},"reference":[{"key":"10925_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01975-y","author":"A Anand","year":"2019","unstructured":"Anand, A., Conti, M., Kaliyar, P., & Lal, C. (2019). Tare: Topology adaptive re-keying scheme for secure group communication in IOT networks. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-019-01975-y","journal-title":"Wireless Networks"},{"key":"10925_CR2","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1109\/glocom.2004.1378375","volume":"4","author":"Q Zhang","year":"2004","unstructured":"Zhang, Q., & Wang, Y. (2004). A centralized key management scheme for hierarchical access control. GLOBECOM\u2013IEEE Global Telecommunications Conference, 4, 2067\u20132071. https:\/\/doi.org\/10.1109\/glocom.2004.1378375","journal-title":"GLOBECOM\u2013IEEE Global Telecommunications Conference"},{"key":"10925_CR3","doi-asserted-by":"publisher","unstructured":"Sharma, S., Krishna, C. R. (2015) An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In 2015 IEEE international conference on computational intelligence communication technology, (pp. 687\u2013693) . https:\/\/doi.org\/10.1109\/CICT.2015.116","DOI":"10.1109\/CICT.2015.116"},{"key":"10925_CR4","doi-asserted-by":"publisher","unstructured":"Abdmeziem, M. R., Tandjaoui, D., Romdhani, I. (2015) A decentralized batch-based group key management protocol for mobile internet of things (dbgk). In 2015 IEEE International conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing, (pp. 1109\u20131117) . https:\/\/doi.org\/10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.166","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.166"},{"key":"10925_CR5","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TC.2015.2419662","volume":"65","author":"Q Wu","year":"2016","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farras, O., & Manjon, J. A. (2016). Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Transactions on Computers, 65, 466\u2013479. https:\/\/doi.org\/10.1109\/TC.2015.2419662","journal-title":"IEEE Transactions on Computers"},{"key":"10925_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3233\/JCS-2007-15106","volume":"15","author":"S Xu","year":"2007","unstructured":"Xu, S. (2007). On the security of group communication schemes. Journal of Computer Security, 15, 129\u2013169. https:\/\/doi.org\/10.3233\/JCS-2007-15106","journal-title":"Journal of Computer Security"},{"key":"10925_CR7","doi-asserted-by":"publisher","first-page":"39824","DOI":"10.1109\/ACCESS.2023.3269297","volume":"11","author":"VK Quy","year":"2023","unstructured":"Quy, V. K., Chehri, A., Quy, N. M., Han, N. D., & Ban, N. T. (2023). Innovative trends in the 6g era: A comprehensive survey of architecture, applications, technologies, and challenges. IEEE Access, 11, 39824\u201339844. https:\/\/doi.org\/10.1109\/ACCESS.2023.3269297","journal-title":"IEEE Access"},{"issue":"19","key":"10925_CR8","doi-asserted-by":"publisher","first-page":"23704","DOI":"10.1109\/JSEN.2023.3307617","volume":"23","author":"VK Quy","year":"2023","unstructured":"Quy, V. K., Ban, N. T., Van Anh, D., Quy, N. M., & Nguyen, D. C. (2023). An adaptive gateway selection mechanism for manet-IOT applications in 5g networks. IEEE Sensors Journal, 23(19), 23704\u201323712. https:\/\/doi.org\/10.1109\/JSEN.2023.3307617","journal-title":"IEEE Sensors Journal"},{"key":"10925_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2023.100867","volume":"38","author":"Q Vu Khanh","year":"2023","unstructured":"Vu Khanh, Q., Nguyen, V.-H., Minh, Q. N., Van Dang, A., Le Anh, N., & Chehri, A. (2023). An efficient edge computing management mechanism for sustainable smart cities. Sustainable Computing: Informatics and Systems, 38, 100867. https:\/\/doi.org\/10.1016\/j.suscom.2023.100867","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"10925_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102599","volume":"55","author":"A Rawat","year":"2020","unstructured":"Rawat, A., & Deshmukh, M. (2020). Tree and elliptic curve based efficient and secure group key agreement protocol. Journal of Information Security and Applications, 55, 102599. https:\/\/doi.org\/10.1016\/j.jisa.2020.102599","journal-title":"Journal of Information Security and Applications"},{"key":"10925_CR11","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-030-20615-4_14","volume-title":"Ubiquitous Communications and Network Computing","author":"K Hamsha","year":"2019","unstructured":"Hamsha, K., & Nagaraja, G. S. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNS. In N. Kumar & R. Venkatesha Prasad (Eds.), Ubiquitous Communications and Network Computing (pp. 188\u2013197). Cham: Springer."},{"key":"10925_CR12","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.camwa.2012.02.008","volume":"65","author":"Y Piao","year":"2013","unstructured":"Piao, Y., Kim, J., Tariq, U., & Hong, M. (2013). Polynomial-based key management for secure intra-group and inter-group communication. Computers and Mathematics with Applications, 65, 1300\u20131309. https:\/\/doi.org\/10.1016\/j.camwa.2012.02.008","journal-title":"Computers and Mathematics with Applications"},{"key":"10925_CR13","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.adhoc.2017.12.006","volume":"71","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Li, H., & Li, J. (2018). Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme. Ad Hoc Networks, 71, 68\u201377. https:\/\/doi.org\/10.1016\/j.adhoc.2017.12.006","journal-title":"Ad Hoc Networks"},{"key":"10925_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-030-67550-9_8","volume-title":"Mobile, Secure, and Programmable Networking","author":"M Nafi","year":"2021","unstructured":"Nafi, M., Bouzefrane, S., & Omar, M. (2021). Efficient and lightweight polynomial-based key management scheme for dynamic networks. In S. Bouzefrane, M. Laurent, S. Boumerdassi, & E. Renault (Eds.), Mobile, Secure, and Programmable Networking (pp. 110\u2013122). Cham: Springer."},{"key":"10925_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4465","volume":"33","author":"V Kumar","year":"2020","unstructured":"Kumar, V., Kumar, R., & Pandey, S. K. (2020). A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications. International Journal of Communication Systems, 33, 1\u201322. https:\/\/doi.org\/10.1002\/dac.4465","journal-title":"International Journal of Communication Systems"},{"key":"10925_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.18494\/SAM.2018.1751","volume":"30","author":"TC Hsiao","year":"2018","unstructured":"Hsiao, T. C., Huang, Y. T., Huang, Y. M., Chen, T. L., Chen, T. S., & Wang, S. D. (2018). Efficient and scalable access management scheme based on Chinese remainder theorem. Sensors and Materials, 30, 413\u2013422. https:\/\/doi.org\/10.18494\/SAM.2018.1751","journal-title":"Sensors and Materials"},{"key":"10925_CR17","doi-asserted-by":"publisher","unstructured":"Koti, N. (2015) Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In 2015 International conference on advances in computing, communications and informatics (ICACCI), (pp. 1825\u20131829). https:\/\/doi.org\/10.1109\/ICACCI.2015.7275882","DOI":"10.1109\/ICACCI.2015.7275882"},{"key":"10925_CR18","doi-asserted-by":"publisher","unstructured":"Chaudhari, A., Pareek, G., Purushothama, B. R. (2017) Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI),(pp. 1576\u20131581). https:\/\/doi.org\/10.1109\/ICACCI.2017.8126066","DOI":"10.1109\/ICACCI.2017.8126066"},{"key":"10925_CR19","doi-asserted-by":"publisher","unstructured":"Chaudhari, A., Pareek, G., Purushothama, B. R. (2017) Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In 2017 international conference on advances in computing, communications and informatics, ICACCI (pp. 1576\u20131581). https:\/\/doi.org\/10.1109\/ICACCI.2017.8126066","DOI":"10.1109\/ICACCI.2017.8126066"},{"issue":"3","key":"10925_CR20","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P Vijayakumar","year":"2014","unstructured":"Vijayakumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralised group key management for secure multicast communication. IET Information Security, 8(3), 179\u2013187. https:\/\/doi.org\/10.1049\/iet-ifs.2012.0352","journal-title":"IET Information Security"},{"key":"10925_CR21","doi-asserted-by":"crossref","unstructured":"SathiyaBalan, V.K., Zavarsky, P., Lindskog, D., Butakov, S. (2015) Study of applicability of Chinese remainder theorem based group key management for cloud environment. In 2015 10th International conference for internet technology and secured transactions (ICITST), (pp. 114\u2013119). IEEE","DOI":"10.1109\/ICITST.2015.7412069"},{"issue":"1","key":"10925_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-020-08904-8","volume":"80","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Kumar, R., & Pandey, S. K. (2021). A computationally efficient and scalable key management scheme for access control of media delivery in digital pay-tv systems. Multimedia Tools and Applications, 80(1), 1\u201334. https:\/\/doi.org\/10.1007\/s11042-020-08904-8","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"10925_CR23","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TITS.2020.2975226","volume":"22","author":"A Mansour","year":"2021","unstructured":"Mansour, A., Malik, K. M., Alkaff, A., & Kanaan, H. (2021). Alms: Asymmetric lightweight centralized group key management protocol for Vanets. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1663\u20131678. https:\/\/doi.org\/10.1109\/TITS.2020.2975226","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"1","key":"10925_CR24","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s11277-018-5471-5","volume":"103","author":"B Sun","year":"2018","unstructured":"Sun, B., Li, Q., & Tian, B. (2018). Local dynamic key management scheme based on layer-cluster topology in WSN. Wireless Personal Communications, 103(1), 699\u2013714. https:\/\/doi.org\/10.1007\/s11277-018-5471-5","journal-title":"Wireless Personal Communications"},{"key":"10925_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.vehcom.2018.09.003","volume":"14","author":"J Cui","year":"2018","unstructured":"Cui, J., Tao, X., Zhang, J., Xu, Y., & Zhong, H. (2018). Hcpa-gka: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for Vanets. Vehicular Communications, 14, 15\u201325. https:\/\/doi.org\/10.1016\/j.vehcom.2018.09.003","journal-title":"Vehicular Communications"},{"key":"10925_CR26","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-14977-6_30","volume-title":"Distributed Computing and Internet Technology","author":"PK Bhaskar","year":"2015","unstructured":"Bhaskar, P. K., & Pais, A. R. (2015). A Chinese remainder theorem based key management algorithm for hierarchical wireless sensor network. In R. Natarajan, G. Barua, & M. R. Patra (Eds.), Distributed Computing and Internet Technology (pp. 311\u2013317). Cham: Springer."},{"issue":"1","key":"10925_CR27","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1002\/dac.2348","volume":"27","author":"C Guo","year":"2014","unstructured":"Guo, C., & Chang, C.-C. (2014). An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. International Journal of Communication Systems, 27(1), 126\u2013134.","journal-title":"International Journal of Communication Systems"},{"key":"10925_CR28","doi-asserted-by":"publisher","unstructured":"Xu, G., Chen, X., Du, X. (2012) Chinese remainder theorem based dtn group key management. In: 2012 ieee 14th international conference on communication technology, (pp. 779\u2013783) . https:\/\/doi.org\/10.1109\/ICCT.2012.6511309","DOI":"10.1109\/ICCT.2012.6511309"},{"key":"10925_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102108","volume":"117","author":"K Sowjanya","year":"2021","unstructured":"Sowjanya, K., Dasgupta, M., & Ray, S. (2021). A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IOT healthcare systems. Journal of Systems Architecture, 117, 102108. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102108","journal-title":"Journal of Systems Architecture"},{"issue":"1","key":"10925_CR30","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/htl.2018.5114","volume":"7","author":"AM Perumal","year":"2020","unstructured":"Perumal, A. M., & Nadar, E. R. S. (2020). Architectural framework of a group key management system for enhancing e-healthcare data security. Healthcare Technology Letters, 7(1), 13\u201317.","journal-title":"Healthcare Technology Letters"},{"issue":"12","key":"10925_CR31","doi-asserted-by":"publisher","first-page":"4841","DOI":"10.1002\/cpe.4841","volume":"31","author":"S Kanimozhi","year":"2019","unstructured":"Kanimozhi, S., Kannan, A., Suganya Devi, K., & Selvamani, K. (2019). Secure cloud-based e-learning system with access control and group key mechanism. Concurrency and Computation: Practice and Experience, 31(12), 4841.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10925_CR32","doi-asserted-by":"publisher","first-page":"117354","DOI":"10.1109\/ACCESS.2020.3004711","volume":"8","author":"KA Abuhasel","year":"2020","unstructured":"Abuhasel, K. A., & Khan, M. A. (2020). A secure industrial internet of things (IIOT) framework for resource management in smart manufacturing. IEEE Access, 8, 117354\u2013117364. https:\/\/doi.org\/10.1109\/ACCESS.2020.3004711","journal-title":"IEEE Access"},{"issue":"11","key":"10925_CR33","doi-asserted-by":"publisher","first-page":"8326","DOI":"10.1109\/TII.2022.3176048","volume":"18","author":"J Li","year":"2022","unstructured":"Li, J., Qiao, Z., & Peng, J. (2022). Asymmetric group key agreement protocol based on blockchain and attribute for industrial internet of things. IEEE Transactions on Industrial Informatics, 18(11), 8326\u20138335. https:\/\/doi.org\/10.1109\/TII.2022.3176048","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10925_CR34","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"B Prabhu kavin","year":"2019","unstructured":"Prabhu kavin, B., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IOT-based applications. Computer Networks, 151, 181\u2013190. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.032","journal-title":"Computer Networks"},{"key":"10925_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/s20051357","author":"Y Jiang","year":"2020","unstructured":"Jiang, Y., Shen, Y., & Zhu, Q. (2020). A lightweight key agreement protocol based on Chinese remainder theorem and ECDH for smart homes. Sensors. https:\/\/doi.org\/10.3390\/s20051357","journal-title":"Sensors"},{"issue":"3","key":"10925_CR36","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1109\/COMST.2019.2907650","volume":"21","author":"A Ghosal","year":"2019","unstructured":"Ghosal, A., & Conti, M. (2019). Key management systems for smart grid advanced metering infrastructure: A survey. IEEE Communications Surveys & Tutorials, 21(3), 2831\u20132848. https:\/\/doi.org\/10.1109\/COMST.2019.2907650","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10925-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-10925-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10925-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T12:13:03Z","timestamp":1713787983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-10925-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10925"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-10925-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"27 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors state that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No animals and humans are involved in this research work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or Animal Rights"}},{"value":"All authors give their consent for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}