Skip to main content
. 2022 Jan 3;22(1):331. doi: 10.3390/s22010331

Table 4.

Security features comparison for the proposed key management protocol and other shared secret related works.

Security Features Shamir Secret [11] Ulutas et al.
[17]
Harn et al.
[20]
Liu et al.
[21]
Liu et al. [22] Meng et al. [28] Liu et al.
[29]
The Proposed
Authentication using HMAC No No No No No No No Yes
Key updating No No No No No No No Yes
Verification of secret shares No No Yes Yes Yes Yes No No
Secure channel requirement Yes Yes No Yes Yes Yes Yes No
Centralized implementation No No Yes Yes Yes Yes Yes Yes
Based Shamir Secret Share Yes Yes No No Yes No Yes Yes
(t,n) secret sharing Yes Yes Yes Yes Yes Yes Yes Yes
Group member broadcasting Yes Yes Yes Yes No Yes Yes No
Unconditionally secure Yes Yes No Yes Yes Yes Yes Yes