{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T09:21:27Z","timestamp":1769937687584,"version":"3.49.0"},"reference-count":30,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T00:00:00Z","timestamp":1557446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["2018ZD06"],"award-info":[{"award-number":["2018ZD06"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the development of 5G and the Internet of Things (IoT), mobile terminals are widely used in various applications under multicast scenarios. However, due to the limited computation resources of mobile terminals, reducing the computation cost of members in group key distribution processes of dynamic groups has become an important issue. In this paper, we propose a computation-efficient group key distribution (CEGKD) protocol. First, an improved secret sharing scheme is proposed to construct faster encryption and decryption algorithms. Second, the tree structure of logical key hierarchy (LKH) is employed to implement a simple and effective key-numbering method. Theoretical analysis is given to prove that the proposed protocol meets forward security and backward security. In addition, the experiment results show that the computation cost of CEGKD on the member side is reduced by more than 85% compared with that of the LKH scheme.<\/jats:p>","DOI":"10.3390\/info10050175","type":"journal-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T03:57:07Z","timestamp":1557719827000},"page":"175","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme"],"prefix":"10.3390","volume":"10","author":[{"given":"Runhai","family":"Jiao","sequence":"first","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"given":"Hong","family":"Ouyang","sequence":"additional","affiliation":[{"name":"China-Power Information Technology Co., Ltd., Beijing 100089, China"}]},{"given":"Yukun","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"given":"Yaoming","family":"Luo","sequence":"additional","affiliation":[{"name":"State Grid Jiangxi Electric Power Corporation, Nanchang 330077, China"}]},{"given":"Gang","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Chongqing Electric Power Co. Electric Power Research Institute, Chongqing 400022, China"}]},{"given":"Zaiyu","family":"Jiang","sequence":"additional","affiliation":[{"name":"China-Power Information Technology Co., Ltd., Beijing 100089, China"}]},{"given":"Qian","family":"Zheng","sequence":"additional","affiliation":[{"name":"China-Power Information Technology Co., Ltd., Beijing 100089, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Dejan, V., Andrea, T., Savo, D., and Khirallah, C. (2018). Random Linear Network Coding for 5G Mobile Video Delivery. Information, 9.","DOI":"10.3390\/info9040072"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CC.2014.6969789","article-title":"An overview of Internet of Vehicles","volume":"11","author":"Yang","year":"2014","journal-title":"Chin. Commun."},{"key":"ref_3","first-page":"3619","article-title":"A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges","volume":"5","author":"Akpakwu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","article-title":"Secure group communications using key graphs","volume":"8","author":"Wong","year":"2000","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_5","first-page":"3620","article-title":"Group Key Management Protocols: A Novel Taxonomy","volume":"2","author":"Challal","year":"2008","journal-title":"Int. Sch. Sci. Res. Innov."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhu, S., and Jajodia, S. (2010). Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions. Network Security, Springer.","DOI":"10.1007\/978-0-387-73821-5_3"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhou, Z., and Huang, D. (2010, January 14\u201319). An Optimal Key Distribution Scheme for Secure Multicast Group Communication. Proceedings of the IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462217"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/49.790485","article-title":"The VersaKey framework: Versatile group key management","volume":"17","author":"Waldvogel","year":"1998","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1109\/TC.2010.40","article-title":"Authenticated Group Key Transfer Protocol Based on Secret Sharing","volume":"59","author":"Harn","year":"2010","journal-title":"IEEE Trans. Comput."},{"key":"ref_10","unstructured":"Penrig, A., Song, D., and Tygar, J.D. (2002, January 14\u201316). ELK, a new protocol for efficient large-group key distribution. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_11","first-page":"171","article-title":"LKH+2: An improvement on the LKH+ algorithm for removal operations","volume":"9","author":"Rafaeli","year":"1971","journal-title":"Arkiv F\u00f6r Matematik."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Wallner, D.M., Harder, E.J., and Agee, R.C. (1999). Key Management for Multicast: Issues and Architectures, The Internet Society.","DOI":"10.17487\/rfc2627"},{"key":"ref_13","unstructured":"Wong, C.K., and Lam, S.S. (2000, January 20\u201325). Keystone: A group key management service. Proceedings of the International Conference on Telecommunications, Acapulco, Mexico."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","article-title":"Key Establishment in Large Dynamic Groups Using One-Way Function Trees","volume":"29","author":"Sherman","year":"2003","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_15","unstructured":"Li, X.S., Yang, Y.R., Gouda, M.G., and Lam, S.S. (2008, January 1\u20135). Batch rekeying for secure group communications. Proceedings of the International Conference on World Wide Web, Hong Kong, China."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TPDS.2007.70759","article-title":"Computation Efficient Multicast Key Distribution","volume":"19","author":"Xu","year":"2008","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liu, X., Huang, J., and Gao, X. (2017). A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs. Sensors, 17.","DOI":"10.3390\/s17051133"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yoneyama, K., Yoshida, R., Kawahara, Y., Kobayashi, T., Fuji, H., and Yamamoto, T. (2016, January 10\u201311). Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. Proceedings of the International Conference on Provable Security, Nanjing, China.","DOI":"10.1007\/978-3-319-47422-9_12"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.comcom.2016.08.001","article-title":"Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members","volume":"98","author":"Chen","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to Share a Secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Blakley, G.R. (1979, January 4\u20137). Safeguarding cryptographic keys. Proceedings of the AFIPS, New York, NY, USA.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0020-0190(89)90008-2","article-title":"A new threshold scheme and its application in designing the conference key distribution cryptosystem","volume":"32","author":"Laih","year":"1989","journal-title":"Inf. Process. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Just, M., Kranakis, E., Krizanc, D., and van Oorschot, P. (1994, January 2\u20134). On key distribution via true broadcasting. Proceedings of the ACM Conference on Computer and Communications Security, Fairfax, VA, USA.","DOI":"10.1145\/191177.191195"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Sun, Y., Trappe, W., and Liu, K.R. (2008). Network-Aware Security for Group Communications, Springer.","DOI":"10.1007\/978-0-387-68848-0"},{"key":"ref_25","unstructured":"Lin, J. (2005, January 17). Efficient Group Key Management Protocol with One-Way Key Derivation. Proceedings of the IEEE Conference on Local Computer Networks Anniversary, Sydney, Australia."},{"key":"ref_26","first-page":"1144","article-title":"Group Key Management based on (2, 2) Secret Sharing","volume":"8","author":"Wuu","year":"2014","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1049\/iet-ifs.2015.0398","article-title":"Cost-effective polynomial-based multicast\u2013unicast key distribution framework for secure group communication in IPv6 multicast networks","volume":"10","author":"Ganesan","year":"2016","journal-title":"IET Inf. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mahmood, Z., Ning, H., and Ghafoor, A. (2017). A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks. Sensors, 17.","DOI":"10.3390\/s17040670"},{"key":"ref_29","first-page":"64","article-title":"Conference Key Agreement from Secret Sharing","volume":"Volume 1587","author":"Li","year":"1999","journal-title":"Proceedings of the Australasian Conference on Information Security and Privacy"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1090\/S0025-5718-1984-0744931-0","article-title":"Polynomial interpolation: Lagrange versus Newton","volume":"43","author":"Werner","year":"1984","journal-title":"Math. Comput."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/5\/175\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:50:53Z","timestamp":1760187053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/5\/175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,10]]},"references-count":30,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["info10050175"],"URL":"https:\/\/doi.org\/10.3390\/info10050175","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,10]]}}}