Cross-cluster asymmetric group key agreement for wireless sensor networks

  • Jiamin Zheng
  • Yu-an Tan
  • Qikun Zhang
  • Xiaosong Zhang
  • Liehuang Zhu
  • Quanxin Zhang
Highlight

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. U1636213), Natural Science Foundation of Henan Province (Grant No. 162300410322), and Beijing Municipal Natural Science Foundation (Grant No. 4172053).

References

  1. 1.
    Zhu R J, Tan Y A, Zhang Q X, et al. Determining image base of firmware for ARM devices by matching literal pools. Digit Invest Int J Digit Foren Incident Response, 2016, 16: 19–28Google Scholar
  2. 2.
    Zhu H F, Tan Y A, Zhang X S, et al. A round-optimal lattice-based blind signature scheme for cloud services. Future Gener Comput Syst, 2017, 73: 106–114CrossRefGoogle Scholar
  3. 3.
    Xue Y, Tan Y A, Liang C, et al. An optimized data hiding scheme for deflate codes. In: Soft Computing. Berlin: Springer, 2017. 1–11Google Scholar
  4. 4.
    Zhang X S, Tan Y A, Xue Y, et al. Cryptographic key protection against FROST for mobile devices. Cluster Comput, 2017, 20: 2393–2402CrossRefGoogle Scholar
  5. 5.
    Du X J, Guizani M, Xiao Y, et al. Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. Int J Comput Technol Appl, 2009, 8: 1223–1229Google Scholar
  6. 6.
    Lee C C, Lin T H, Tsai C S. A new authenticated group key agreement in a mobile environment. Ann Telecommun, 2009, 64: 735–744CrossRefGoogle Scholar
  7. 7.
    Tsai J L. A novel authenticated group key agreement protocol for mobile environment. Ann Telecommun Ann Des télécommun, 2011, 66: 663–669CrossRefGoogle Scholar
  8. 8.
    Chen Y, He M X, Zeng S K, et al. Universally composable asymmetric group key agreement protocol. In: Proceedings of the 10th International Conference on Information, Communications and Signal Processing, Singapore, 2016Google Scholar
  9. 9.
    Zhang L, Wu Q H, Domingo-Ferrer J, et al. Roundefficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans Inf Foren Secur, 2015, 10: 2352–2364CrossRefGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Jiamin Zheng
    • 1
  • Yu-an Tan
    • 1
    • 2
  • Qikun Zhang
    • 3
  • Xiaosong Zhang
    • 1
    • 4
  • Liehuang Zhu
    • 1
  • Quanxin Zhang
    • 1
  1. 1.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina
  2. 2.Research Center of Massive Language Information Processing and Cloud Computing ApplicationBeijingChina
  3. 3.Institute of Computer and Communication EngineeringZhengzhou University of Light IndustryZhengzhouChina
  4. 4.Department of Computer Science and TechnologyTangshan UniversityTangshanChina

Personalised recommendations