Next Article in Journal
A Novel Adaptive LMS Algorithm with Genetic Search Capabilities for System Identification of Adaptive FIR and IIR Filters
Previous Article in Journal
Sequeval: An Offline Evaluation Framework for Sequence-Based Recommender Systems
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessArticle

A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme

School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China
China-Power Information Technology Co., Ltd., Beijing 100089, China
State Grid Jiangxi Electric Power Corporation, Nanchang 330077, China
State Grid Chongqing Electric Power Co. Electric Power Research Institute, Chongqing 400022, China
Author to whom correspondence should be addressed.
Information 2019, 10(5), 175;
Received: 21 March 2019 / Revised: 27 April 2019 / Accepted: 8 May 2019 / Published: 10 May 2019
(This article belongs to the Section Information and Communications Technology)
PDF [2052 KB, uploaded 10 May 2019]
  |     |  


With the development of 5G and the Internet of Things (IoT), mobile terminals are widely used in various applications under multicast scenarios. However, due to the limited computation resources of mobile terminals, reducing the computation cost of members in group key distribution processes of dynamic groups has become an important issue. In this paper, we propose a computation-efficient group key distribution (CEGKD) protocol. First, an improved secret sharing scheme is proposed to construct faster encryption and decryption algorithms. Second, the tree structure of logical key hierarchy (LKH) is employed to implement a simple and effective key-numbering method. Theoretical analysis is given to prove that the proposed protocol meets forward security and backward security. In addition, the experiment results show that the computation cost of CEGKD on the member side is reduced by more than 85% compared with that of the LKH scheme. View Full-Text
Keywords: key distribution; multicast; secret sharing; logical key hierarchy key distribution; multicast; secret sharing; logical key hierarchy

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Jiao, R.; Ouyang, H.; Lin, Y.; Luo, Y.; Li, G.; Jiang, Z.; Zheng, Q. A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme. Information 2019, 10, 175.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top