{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T18:40:04Z","timestamp":1749580804999,"version":"3.41.0"},"reference-count":49,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"DOI":"10.1093\/comjnl\/bxw061","type":"journal-article","created":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T00:57:54Z","timestamp":1473728274000},"source":"Crossref","is-referenced-by-count":2,"title":["On the (In)Security of Recent Group Key Distribution Protocols"],"prefix":"10.1093","author":[{"given":"Jing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yunyun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xuezheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yunchun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Shaowen","family":"Yao","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"2016091217574639000_bxw061v1.1","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"key":"2016091217574639000_bxw061v1.2","first-page":"105","article-title":"Group key management protocols: a novel taxonomy","volume":"2","author":"Challal","year":"2005","journal-title":"Int. J. Inf. Technol."},{"key":"2016091217574639000_bxw061v1.3","doi-asserted-by":"crossref","unstructured":"Zhu, S. and Jajodia, S. (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In Huang, S.C.H.C.H. , MacCallum, D. and Du, D.-Z. Network Security, Springer, US.","DOI":"10.1007\/978-0-387-73821-5_3"},{"key":"2016091217574639000_bxw061v1.4","doi-asserted-by":"crossref","unstructured":"Fiat, A. and Naor, M. (1994) Broadcast Encryption. In Proc. Adv. Cryptology \u2014 CRYPTO\u2019 93, Santa Barbara, California, USA, August 22\u201326, pp. 480\u2013491. Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"2016091217574639000_bxw061v1.5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.245"},{"key":"2016091217574639000_bxw061v1.6","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"2016091217574639000_bxw061v1.7","unstructured":"Cheung, L. , Cooley, J. , Khazan, R. and Newport, C. (2007) Collusion-resistant group key management using attribute-based encryption. Cryptology ePrint Archive Report 2007\/161, IACR."},{"key":"2016091217574639000_bxw061v1.8","doi-asserted-by":"crossref","unstructured":"Naor, D. , Naor, M. and Lotspiech, J. (2001) Revocation and Tracing Schemes for Stateless Receivers. In Proc. Adv. Cryptology \u2014 CRYPTO 2001, Santa Barbara, California, USA, August 19\u201323, pp. 41\u201362. Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"2016091217574639000_bxw061v1.9","doi-asserted-by":"crossref","unstructured":"Halevy, D. and Shamir, A. (2002) The LSD Broadcast Encryption Scheme. In Proc. Adv. Cryptology \u2014 CRYPTO 2002, Santa Barbara, California, USA, August 18\u201322, pp. 47\u201360. Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-45708-9_4"},{"key":"2016091217574639000_bxw061v1.10","doi-asserted-by":"crossref","unstructured":"Dodis, Y. and Fazio, N. (2002) Public Key Trace and Revoke Scheme Secure Against Adaptive Chosen Ciphertext Attack. In Proc. Public Key Cryptography \u2014 PKC 2003, Miami, FL, USA, January 6\u20138, pp. 100\u2013115. Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-36288-6_8"},{"key":"2016091217574639000_bxw061v1.11","doi-asserted-by":"crossref","unstructured":"Boneh, D. , Gentry, C. and Waters, B. (2005) Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In Proc. Adv. Cryptology \u2013 CRYPTO 2005, Santa Barbara, California, USA, August 14\u201318, pp. 258\u2013275. Springer Berlin Heidelberg.","DOI":"10.1007\/11535218_16"},{"key":"2016091217574639000_bxw061v1.12","doi-asserted-by":"crossref","unstructured":"Boneh, D. and Waters, B. (2006) A Fully Collusion Resistant Broadcast, Trace, and Revoke System. In Proc. 13th ACM Conf. Comput. Commun. Security, Alexandria, Virginia, USA, October 30\u2013November 03, pp. 211\u2013220. ACM, New York, NY, USA.","DOI":"10.1145\/1180405.1180432"},{"key":"2016091217574639000_bxw061v1.13","doi-asserted-by":"crossref","unstructured":"Gentry, C. and Waters, B. (2009) Adaptive Security in Broadcast Encryption Systems (with short ciphertexts). In Proc. Adv. Cryptology \u2013 EUROCRYPT 2009, Cologne, Germany, April 26\u201330, pp. 171\u2013188. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"2016091217574639000_bxw061v1.14","doi-asserted-by":"crossref","unstructured":"Nam, J. , Paik, J. , Lee, B. , Lee, K. and Won, D. (2011) An Improved Protocol for Server-Aided Authenticated Group Key Establishment. In Proc. ICCSA 2011, Santander, Spain, June 20\u201323, pp. 437\u2013446. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-21934-4_35"},{"key":"2016091217574639000_bxw061v1.15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"2016091217574639000_bxw061v1.16","doi-asserted-by":"crossref","unstructured":"Nam, J. , Kim, M. , Paik, J. , Jeon, W. , Lee, B. and Won, D. (2011) Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing. In Proc. FGIT 2011, Jeju Island, Korea, December 8\u201310, pp. 309\u2013315. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-27142-7_36"},{"key":"2016091217574639000_bxw061v1.17","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070117"},{"key":"2016091217574639000_bxw061v1.18","doi-asserted-by":"crossref","unstructured":"Olimid, R. (2014) A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol. In Proc. Int. Joint Conf. SOCO\u201914-CISIS\u201914-ICEUTE\u201914, Bilbao, Spain, June 25\u201327, pp. 333\u2013342. Springer International Publishing.","DOI":"10.1007\/978-3-319-07995-0_33"},{"key":"2016091217574639000_bxw061v1.19","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"2016091217574639000_bxw061v1.20","doi-asserted-by":"crossref","unstructured":"Wallner, D.M. , Harder, E.J. and Agee, R.C. (1998) Key management for multicast: issues and architectures. Internet Draft, Internet Eng. Task Force.","DOI":"10.17487\/rfc2627"},{"key":"2016091217574639000_bxw061v1.21","doi-asserted-by":"crossref","unstructured":"Canetti, R. , Garay, J. , Itkis, G. , Micciancio, D. , Naor, M. and Pinkas, B. (1999) Multicast Security: A Taxonomy and Some Efficient Constructions. In Proc. INFOCOM \u201899, New York, NY, USA, March 21\u201325, pp. 708\u2013716. IEEE.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"2016091217574639000_bxw061v1.22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"2016091217574639000_bxw061v1.23","doi-asserted-by":"crossref","unstructured":"Perrig, A. , Song, D. and Tygar, D. (2001) ELK, A New Protocol for Efficient Large-Group Key Distribution. In Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 14\u201316, pp. 247\u2013262. IEEE.","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"2016091217574639000_bxw061v1.24","doi-asserted-by":"publisher","DOI":"10.1109\/49.790485"},{"key":"2016091217574639000_bxw061v1.25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2144584"},{"key":"2016091217574639000_bxw061v1.26","doi-asserted-by":"crossref","unstructured":"Chen, Y. , Tygar, J.D. and Tzeng, W. (2011) Secure Group Key Management using Uni-Directional Proxy Re-encryption Schemes. In Proc. INFOCOM 2011, Shanghai, China, April 10\u201315, pp. 1952\u20131960. IEEE.","DOI":"10.1109\/INFCOM.2011.5934999"},{"key":"2016091217574639000_bxw061v1.27","doi-asserted-by":"crossref","unstructured":"Zhou, Z. and Huang, D. (2010) An Optimal Key Distribution Scheme for Secure Multicast Group Communication. In Proc. INFOCOM 2010, San Diego, CA, USA, March 14\u201319, pp. 1\u20135. IEEE.","DOI":"10.1109\/INFCOM.2010.5462217"},{"key":"2016091217574639000_bxw061v1.28","doi-asserted-by":"crossref","unstructured":"Chen, Y. and Yang, G. (2011) Efficient and Secure Group Key Management Based on EBS and Attribute Encryption. In Proc. IEEE Int. Conf. Comput. Science and Automation Engg. (CSAE), Shanghai, China, June 10\u201312, pp. 661\u2013665. IEEE.","DOI":"10.1109\/CSAE.2011.5952555"},{"key":"2016091217574639000_bxw061v1.29","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070444"},{"key":"2016091217574639000_bxw061v1.30","unstructured":"Fan, J. , Judge, P. and Ammar, M.H. (2002) HySOR: Group Key Management with Collusion-Scalability Tradeoffs Using a Hybrid Structuring of Receivers. In Proc. 11th Int. Conf. Comput. Commun. Netw., Miami, Florida, USA, October 14\u201316, pp. 196\u2013201. IEEE."},{"key":"2016091217574639000_bxw061v1.31","doi-asserted-by":"crossref","unstructured":"Kim, H. , Hong, S.M. , Yoon, H. and Cho, J.W. (2005) Secure Group Communication with Multiplicative One-way Functions. In Proc. Int. Conf. Inf. Technology: Coding and Computing (ITCC), Las Vegas, NV, USA, April 4\u20136, pp. 685\u2013690. IEEE.","DOI":"10.1109\/ITCC.2005.252"},{"key":"2016091217574639000_bxw061v1.32","doi-asserted-by":"crossref","unstructured":"Chang, I. , Engel, R. , Kandlur, D. , Pendarakis, D. and Saha, D. (1999) Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques. In Proc. INFOCOM \u201899, New York, NY, USA, March 21\u201325, pp. 689\u2013698 Vol. 2. IEEE.","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"2016091217574639000_bxw061v1.33","unstructured":"Liu, J. and Wang, C.J. (2011) Exclusive key based group rekeying, Cryptology ePrint Archive, Report 2011\/575, IACR."},{"key":"2016091217574639000_bxw061v1.34","first-page":"1050","article-title":"Cryptanalysis of a key management scheme for secure multicast communications","volume":"E85-B","author":"Horng","year":"2002","journal-title":"IEICE Trans. Commun."},{"key":"2016091217574639000_bxw061v1.35","doi-asserted-by":"crossref","unstructured":"Ku, W.C. and Chen, S.M. (2003) An Improved Key Management Scheme for Large Dynamic Groups using One-Way Function Trees. In Proc. Int. Conf. Parallel Process. Workshops, Kaohsiung, Taiwan, October 6\u20139, pp. 391\u2013396. IEEE.","DOI":"10.1109\/ICPPW.2003.1240394"},{"key":"2016091217574639000_bxw061v1.36","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90008-2"},{"key":"2016091217574639000_bxw061v1.37","doi-asserted-by":"crossref","unstructured":"Just, M. , Kranakis, E. , Krizanc, D. and Oorschot, P.V. (1994) On Key Distribution via True Broadcasting. In Proc. 2nd ACM Conf. Comput. Commun. Security, Fairfax, Virginia, USA, November 02\u201304, pp. 81\u201388. ACM, New York, NY, USA.","DOI":"10.1145\/191177.191195"},{"key":"2016091217574639000_bxw061v1.38","doi-asserted-by":"crossref","unstructured":"Sun, Y. , Trappe, W. and Liu, K.J.R. (2008) Network-aware Security for Group Communications, Springer, New York.","DOI":"10.1007\/978-0-387-68848-0"},{"key":"2016091217574639000_bxw061v1.39","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1970-0276200-X"},{"key":"2016091217574639000_bxw061v1.40","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070532"},{"key":"2016091217574639000_bxw061v1.41","unstructured":"Olimid, R.F. (2013) Secret sharing-based group key establishment. In PhD Thesis at Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania."},{"key":"2016091217574639000_bxw061v1.42","doi-asserted-by":"crossref","unstructured":"Staddon, J. , Miner, S. , Franklin, M. , Balfanz, D. , Malkin, M. and Dean, D. (2002) Self-Healing Key Distribution with Revocation. In Proc. IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12\u201315, pp. 241\u2013257. IEEE Computer Society, Washington, DC, USA.","DOI":"10.1109\/SECPRI.2002.1004375"},{"key":"2016091217574639000_bxw061v1.43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885514"},{"key":"2016091217574639000_bxw061v1.44","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118391857900"},{"key":"2016091217574639000_bxw061v1.45","doi-asserted-by":"crossref","unstructured":"Bethencourt, J. , Sahai, A. and Waters, B. (2007) Ciphertext-Policy Attribute-Based Encryption. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, May 20\u201323, pp. 321\u2013334. IEEE Computer Society.","DOI":"10.1109\/SP.2007.11"},{"key":"2016091217574639000_bxw061v1.46","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1956.tb03835.x"},{"key":"2016091217574639000_bxw061v1.47","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015697.38671.ec"},{"key":"2016091217574639000_bxw061v1.48","unstructured":"Panjwani, S. (2007) Private group communication: two perspectives and a unifying solution. In PhD Thesis at Computer Science and Engineering, University of California, San Diego."},{"key":"2016091217574639000_bxw061v1.49","unstructured":"Cover, T.M. and Thomas, J.A. (2006) Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing), Wiley-Interscience, Hoboken, New Jersey."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/4\/507\/11077786\/bxw061.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T18:20:26Z","timestamp":1749579626000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxw061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":49,"alternative-id":["10.1093\/comjnl\/bxw061"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxw061","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published":{"date-parts":[[2016,9,12]]}}}