Table 4.
Security Features | Shamir Secret [11] | Ulutas et al. [17] |
Harn et al. [20] |
Liu et al. [21] |
Liu et al. [22] | Meng et al. [28] | Liu et al. [29] |
The Proposed |
---|---|---|---|---|---|---|---|---|
Authentication using HMAC | No | No | No | No | No | No | No | Yes |
Key updating | No | No | No | No | No | No | No | Yes |
Verification of secret shares | No | No | Yes | Yes | Yes | Yes | No | No |
Secure channel requirement | Yes | Yes | No | Yes | Yes | Yes | Yes | No |
Centralized implementation | No | No | Yes | Yes | Yes | Yes | Yes | Yes |
Based Shamir Secret Share | Yes | Yes | No | No | Yes | No | Yes | Yes |
secret sharing | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Group member broadcasting | Yes | Yes | Yes | Yes | No | Yes | Yes | No |
Unconditionally secure | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes |