{"id":"https://openalex.org/W1986920793","doi":"https://doi.org/10.1109/trustcom.2013.41","title":"A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol","display_name":"A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1986920793","doi":"https://doi.org/10.1109/trustcom.2013.41","mag":"1986920793"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.41","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science & Engineering, Nanjing University of Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Engineering, Nanjing University of Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043414541","display_name":"Gongxuan Zhang","orcid":"https://orcid.org/0000-0003-2925-5624"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gongxuan Zhang","raw_affiliation_strings":["School of Computer Science & Engineering, Nanjing University of Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Engineering, Nanjing University of Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100835066","display_name":"Zhenchao Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenchao Zhu","raw_affiliation_strings":["Information Security Research Center, Southeast University, Nanjing , China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Southeast University, Nanjing , China","institution_ids":["https://openalex.org/I76569877"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.229,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.710784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":82},"biblio":{"volume":"16","issue":null,"first_page":"310","last_page":"314"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9476,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Security Protocols for Authentication and Key Exchange","score":0.9321,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.7365207},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key Exchange","score":0.551107},{"id":"https://openalex.org/keywords/key-management","display_name":"Key Management","score":0.524783},{"id":"https://openalex.org/keywords/secure-routing","display_name":"Secure Routing","score":0.505022},{"id":"https://openalex.org/keywords/group-communication","display_name":"Group Communication","score":0.501519}],"concepts":[{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.7365207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7266696},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.692125},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6136558},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5751325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.51720273},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4577784},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44656897},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3732429},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17402491},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08494684},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.41","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.76}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1751727477","https://openalex.org/W189397779","https://openalex.org/W1978122865","https://openalex.org/W1980901365","https://openalex.org/W1987568033","https://openalex.org/W2000130543","https://openalex.org/W2012168171","https://openalex.org/W2035980300","https://openalex.org/W2036126441","https://openalex.org/W2055096528","https://openalex.org/W2064608844","https://openalex.org/W2082969166","https://openalex.org/W2104748480","https://openalex.org/W2116413852","https://openalex.org/W2120245226","https://openalex.org/W2149100429","https://openalex.org/W2168707240"],"related_works":["https://openalex.org/W2512634727","https://openalex.org/W2164896586","https://openalex.org/W2144438995","https://openalex.org/W2111125783","https://openalex.org/W2108334564","https://openalex.org/W2100367016","https://openalex.org/W1997854497","https://openalex.org/W1837027913","https://openalex.org/W1593559483","https://openalex.org/W1577886464"],"abstract_inverted_index":{"A":[0],"fault-tolerant":[1,34,50,73,136],"group":[2,15],"key":[3,10,22,85],"agreement":[4,23],"(GKA)":[5],"protocol":[6,70],"establishes":[7],"a":[8,14,31],"shared":[9],"among":[11],"participants":[12,20],"of":[13,104,123],"even":[16],"when":[17],"some":[18],"malicious":[19],"disrupt":[21],"processes.":[24],"In":[25],"2010,":[26],"Zhao":[27,124],"et":[28,125],"al.":[29],"proposed":[30],"new":[32],"efficient":[33,132],"GKA":[35,51,137],"protocol,":[36,116],"named":[37],"EGKA,":[38],"with":[39],"lower":[40],"computational":[41],"cost":[42,46],"and":[43,53,61,87,128],"average":[44],"communication":[45],"than":[47,133],"all":[48,119],"previously":[49],"protocols,":[52],"claimed":[54],"the":[55,68,83,88,102,120,134],"EGKA":[56,69,115],"is":[57,80,129],"resistant":[58],"to":[59,82],"passive":[60],"active":[62],"attacks.":[63],"Unfortunately,":[64],"we":[65,111],"show":[66],"that":[67],"seems":[71],"not":[72],"in":[74,92],"several":[75],"non-trivial":[76],"cases":[77],"as":[78],"it":[79],"vulnerable":[81],"different":[84],"attack":[86],"message":[89],"tampering":[90],"attack,":[91],"which":[93,117],"an":[94,113],"honest":[95],"participant":[96],"can":[97],"be":[98],"easily":[99],"excluded":[100],"from":[101],"set":[103],"participants.":[105],"To":[106],"remedy":[107],"these":[108],"security":[109],"flaws,":[110],"propose":[112],"improved":[114],"covers":[118],"identified":[121],"weaknesses":[122],"al.'s":[126],"scheme":[127],"still":[130],"more":[131],"existing":[135],"protocols.":[138]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1986920793","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2024-11-22T21:01:30.801563","created_date":"2016-06-24"}