<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Secret Share Based Key Pre-Distribution Scheme</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergey</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
							<email>sbelim@mail.ru</email>
							<affiliation key="aff0">
								<orgName type="institution">Omsk State Technical University</orgName>
								<address>
									<addrLine>11 Mira avenue</addrLine>
									<postCode>644050</postCode>
									<settlement>Omsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Siberian State Automobile and Highway University</orgName>
								<address>
									<addrLine>5 Mira avenue</addrLine>
									<postCode>644080</postCode>
									<settlement>Omsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Svetlana</forename><forename type="middle">Yu</forename><surname>Belim</surname></persName>
							<email>svbelim@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Sergei</forename><forename type="middle">S</forename><surname>Goncharov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yuri</forename><forename type="middle">G</forename><surname>Evtushenko</surname></persName>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">Omsk State Technical University</orgName>
								<address>
									<addrLine>11 Mira avenue</addrLine>
									<postCode>644050</postCode>
									<settlement>Omsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Secret Share Based Key Pre-Distribution Scheme</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">981843748AF10AEB1D6D4E75E1E99836</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The key pre-distribution scheme including an encryption key cogeneration protocol is proposed. The key pre-distribution scheme is formed based on the Blom's scheme. The Shamir secret sharing threshold scheme (3,4) is used for the key generation protocol. The basic scheme and protocol for two users are discussed. Generalization this scheme for an arbitrary number of users is performed. The correctness of the scheme is proved. F (x) = a 2 x 2 + a 1 x + a 0 .</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Key pre-distribution schemes are widely used in devices with limited resources. Sensor networks and IoT devices use such schemes. The key pre-distribution scheme reduces the amount of information in the device memory. Devices store key materials. The key distribution server generates key materials and sends them to users through secure communication channels. Users store key materials in secure mode. Cryptographic keys are calculated based on key materials. Key materials and open user information are used to calculate keys. The two key pre-distribution schemes are most widely used. KDP scheme uses set theory <ref type="bibr" target="#b0">[1]</ref>. Blom's scheme uses polynomial theory over finite fields <ref type="bibr" target="#b1">[2]</ref>. Blom's scheme is actively used in wireless networks <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>. The KDP scheme is applicable to large networks consisting of subnets <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>We highlight one important disadvantage of all key pre-distribution schemes. This disadvantage is the complete trust of users. The user can calculate the encryption key without the consent of another user. Leakage the key information of one user leads to leakage of all keys this user. Other users cannot prevent this leak. We propose a key pre-distribution scheme that includes a participant interaction protocol to generate a common key. This protocol allows other users to block a compromised user.</p><p>The server sends key content to users over a secure channel.</p><formula xml:id="formula_0">S → A : (x 1A , k 1A ), (x 2A , k 2A ), S → B : (x 1B , k 1B ), (x 2B , k 2B ).</formula><p>If user A initiates a communication channel with user B, then he sends him one parts of the secret k 1A .</p><formula xml:id="formula_1">A → B : A, (x 1A , k 1A ).</formula><p>If user B agrees to create a secure information channel, then he compiles and solves a system of linear equations with respect to b </p><formula xml:id="formula_2">0 , b 1 , b 2 .    b 0 + b 1 x 1B + b 2 x 2 1B = k 1B , b 0 + b 1 x 2B + b 2 x 2 2B = k 2B , b 0 + b 1 x 1A + b 2 x 2 1A = k 1A . User B calculates</formula><formula xml:id="formula_3">k BA = h(b 0 , b 1 , b 2 ).</formula><p>User B then sends one part of the secret k 1B to user A.</p><formula xml:id="formula_4">B → A : (x 1B , k 1B ).</formula><p>User A compiles and solves a system of linear equations from three unknown c 0 , c 1 , c 2 .</p><formula xml:id="formula_5">   c 0 + c 1 x 1A + c 2 x 2 1A = k 1A , c 0 + c 1 x 2A + c 2 x 2 2A = k 2A , c 0 + c 1 x 1B + c 2 x 2 1B = k 1B .</formula><p>User A calculates the common encryption key based on the numbers c 0 , c 1 , c 2 .</p><formula xml:id="formula_6">k AB = h(c 0 , c 1 , c 2 ).</formula><p>We prove that both users will receive the same key.</p><formula xml:id="formula_7">k AB = k BA .</formula><p>We consider the system of equations for user A.</p><formula xml:id="formula_8">   c 0 + c 1 x 1A + c 2 x 2 1A = F (x 1A ), c 0 + c 1 x 2A + c 2 x 2 2A = F (x 2A ), c 0 + c 1 x 1B + c 2 x 2 1B = F (x 1B ).</formula><p>User A obtains the coefficients of the polynomial F (x) when solving this system of equations.</p><formula xml:id="formula_9">c 0 = a 0 , c 1 = a 1 , c 2 = a 2 .</formula><p>We consider the system of equations for user B.</p><formula xml:id="formula_10">   b 0 + b 1 x 1B + b 2 x 2 1B = F (x 1B ), b 0 + b 1 x 2B + b 2 x 2 2B = F (x 2B ), b 0 + b 1 x 1A + b 2 x 2 1A = F (x 1A ).</formula><p>User B obtains the coefficients of the polynomial F (x) when solving this system of equations.</p><formula xml:id="formula_11">b 0 = a 0 , b 1 = a 1 , b 2 = a 2 .</formula><p>Both users receive the same set of numbers.</p><formula xml:id="formula_12">b 0 = c 0 , b 1 = c 1 , b 2 = c 2 .</formula><p>Users receive the same keys.</p><formula xml:id="formula_13">k AB = h(c 0 , c 1 , c 2 ) = h(b 0 , b 1 , b 2 ) = k BA .</formula><p>Protocol reliability is based on a threshold scheme <ref type="bibr" target="#b2">(3,</ref><ref type="bibr" target="#b3">4)</ref>. Both users, as a result of receiving key materials from the server, own two parts of the secret. Users receive a third part of the secret during messaging. Three parts of the secret allow you to restore the full secret. The attacker has the ability to intercept only messages between users, so he can take possession only two parts of the secret. This information is not sufficient to calculate the encryption key.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Scheme for an arbitrary number of users</head><p>We modify our scheme for an arbitrary number of users. All calculations are performed in the ring Z p . p is a prime number. The server generates a unique number a i for each user u i (a i ∈ Z p ). Numbers a i are stored in public on the server. The server ensures that these numbers remain unchanged. The server generates a polynomial from three variables F (x, y, z). The polynomial F (x, y, z) is kept secret. We write the polynomial F (x, y, z) as a polynomial from one variable x with coefficients dependent on the variables y and z. The degree of the polynomial over the variable x is 2.</p><formula xml:id="formula_14">F (x, y, z) = f 2 (y, z)x 2 + f 1 (y, z)x + f 0 (y, z).</formula><p>The functions f 2 (y, z), f 1 (y, z), f 0 (y, z) are polynomials. We enter the requirement of symmetry F (x, y, z) over the variables y and z. F (x, y, z) = F (x, z, y).</p><p>This requirement leads to symmetry of polynomials f 2 (y, z), f 1 (y, z), f 0 (y, z) over variables y and z.</p><formula xml:id="formula_15">f 0 (y, z) = f 0 (z, y), f 1 (y, z) = f 1 (z, y), f 2 (y, z) = f 2 (z, y).</formula><p>The degree of polynomials f 2 (y, z), f 1 (y, z), f 0 (y, z) depends on the number of users. The polynomial coefficients f 2 (y, z), f 1 (y, z), f 0 (y, z) are random numbers.</p><p>The server selects two random numbers x 1i and x 2i (i = 1,..., n) for each user u i . All numbers x 1i and x 2i must be unique. The server generates two parts of the secret for each user. Parts of the secret are polynomials from one variable z.</p><formula xml:id="formula_16">r 1i (z) = F (x 1i , a i , z), r 2i (z) = F (x 2i , a i , z).</formula><p>The server calculates key materials for each user u i (i=1, ..., n). Key materials include two numbers and two functions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Key(u</head><formula xml:id="formula_17">i ) = {x 1i , x 2i , r 1i (z), r 2i (z)}.</formula><p>The polynomials r 1i (z) and r 2i (z) are transmitted as a set of coefficients. The server forwards key content to users via a secure channel.</p><p>If the user u i wants to establish a connection with the user u j , then a sequence of nine steps is performed. 1. The user u i requests the number a j from the server. 2. The user u i calculates two numbers.</p><formula xml:id="formula_18">q 1ij = r 1i (a j ), q 2ij = r 2i (a j ).</formula><p>3. The user u i forwards a message to the user u j .</p><formula xml:id="formula_19">u i → u j : (u i , x 1i , q 1ij ).</formula><p>4. The user u j requests a i from the server and calculates two numbers.</p><formula xml:id="formula_20">q 1ji = r 1j (a i ), q 2ji = r 2j (a i ).</formula><p>5. The user u j forwards a message to the user u i .</p><p>u j → u i : (u j , x 1j , q 1ji ).</p><p>6. The user u j solves a system of linear equations relative to unknown b</p><formula xml:id="formula_21">0 , b 1 , b 2 .    b 2 x 2 1j + b 1 x 1j + b 0 = q 1ji , b 2 x 2 2j + b 1 x 2j + b 0 = q 2ji , b 2 x 2 1i + b 1 x 1i + b 0 = q 1ij .</formula><p>7. The user u j calculates the pair key.</p><formula xml:id="formula_22">k ji = h(b 0 , b 1 , b 2 ).</formula><p>The function from the three variables h = h(x, y, z) is an open part of the schema and is known to all participants.</p><p>8. The user u i solves the system of linear equations with respect to c 0 ,</p><formula xml:id="formula_23">c 1 , c 2 .    c 2 x 2 1i + c 1 x 1i + c 0 = q 1ij , c 2 x 2 2i + c 1 x 2i + c 0 = q 2ij , c 2 x 2 1j + c 1 x 1j + c 0 = q 1ji .</formula><p>9. The user u i calculates the pair key.</p><formula xml:id="formula_24">k ij = h(c 0 , c 1 , c 2 ).</formula><p>We prove that both users receive the same pair keys. We consider the system of user equations u i .</p><formula xml:id="formula_25">q 1ij = r 1i (a j ) = F (x 1i , a i , a j ) = f 2 (a i , a j )x 2 1i + f 1 (a i , a j )x 1i + f 0 (a i , a j ), q 2ij = r 2i (a j ) = F (x 2i , a i , a j ) = f 2 (a i , a j )x 2 2i + f 1 (a i , a j )x 2i + f 0 (a i , a j ), q 1ji = r 1j (a i ) = F (x 1j , a j , a i ) = F (x 1j , a i , a j ) = f 2 (a i , a j )x 2 1j + f 1 (a i , a j )x 1j + f 0 (a i , a j ),    c 2 x 2 1i + c 1 x 1i + c 0 = f 2 (a i , a j )x 2 1i + f 1 (a i , a j )x 1i + f 0 (a i , a j ), c 2 x 2 2i + c 1 x 2i + c 0 = f 2 (a i , a j )x 2 2i + f 1 (a i , a j )x 2i + f 0 (a i , a j ), c 2 x 2 1j + c 1 x 1j + c 0 = f 2 (a i , a j )x 2 1j + f 1 (a i , a j )x 1j + f 0 (a i , a j ).</formula><p>We write this system of equations in matrix form.  </p><formula xml:id="formula_26">x 2 1i x 1i 1 x 2 2i x 2i 1 x 2 1j x 1j 1     c 2 c 1 c 0   =   x 2 1i x 1i 1 x 2 2i x 2i 1 x 2 1j x 1j 1     f 2 (a i , a j ) f 1 (a i , a j ) f 0 (a i , a j )  </formula><p>The matrix in equality is a Vandermonde matrix. The Vandermonde determinant is not zero if all x 1i and x 2i are different. Therefore, we conclude that two vectors are equal.</p><formula xml:id="formula_27">  c 2 c 1 c 0   =   f 2 (a i , a j ) f 1 (a i , a j ) f 0 (a i , a j )   c 2 = f 2 (a i , a j ), c 1 = f 1 (a i , a j ), c 0 = f 0 (a i , a j ).</formula><p>We consider the system for user equations u j .</p><formula xml:id="formula_28">q 1ji = r 1j (a i ) = F (x 1j , a j , a i ) = f 2 (a j , a i )x 2 1j + f 1 (a j , a i )x 1j + f 0 (a j , a i ), q 2ji = r 2j (a i ) = F (x 2j , a j , a i ) = f 2 (a j , a i )x 2 2j + f 1 (a j , a i )x 2j + f 0 (a j , a i ), q 1ij = r 1i (a j ) = F (x 1i , a i , a j ) = F (x 1i , a j , a i ) = f 2 (a j , a i )x 2 1i + f 1 (a j , a i )x 1i + f 0 (a j , a i ),    b 2 x 2 1j + b 1 x 1j + b 0 = f 2 (a j , a i )x 2 1j + f 1 (a j , a i )x 1j + f 0 (a j , a i ), b 2 x 2 2j + b 1 x 2j + b 0 = f 2 (a j , a i )x 2 2j + f 1 (a j , a i )x 2j + f 0 (a j , a i ), b 2 x 2 1i + b 1 x 1i + b 0 = f 2 (a j , a i )x 2 1i + f 1 (a j , a i )x 1i + f 0 (a j , a i ).   x 2 1j x 1j 1 x 2 2j x 2j 1 x 2 1i x 1i 1     b 2 b 1 b 0   =   x 2 1j x 1j 1 x 2 2j x 2j 1 x 2 1i x 1i 1     f 2 (a j , a i ) f 1 (a j , a i ) f 0 (a j , a i )     b 2 b 1 b 0   =   f 2 (a j , a i ) f 1 (a j , a i ) f 0 (a j , a i )   b 2 = f 2 (a j , a i ), b 1 = f 1 (a j , a i ), b 0 = f 0 (a j , a i ).</formula><p>We conclude the equality of numbers from the symmetry of polynomials f 0 , f 1 , f 2 .</p><p>b 0 = c 0 = f 0 (a i , a j ), b 1 = c 1 = f 1 (a i , a j ), b 2 = c 2 = f 2 (a i , a j ).</p><p>Both users receive the same set of numbers. We conclude that the pair keys of both users are equal.</p><formula xml:id="formula_29">k ij = h(c 0 , c 1 , c 2 ) = h(b 0 , b 1 , b 2 ) = k ji .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>The proposed scheme allows any user to control calculation of communication keys with it. This scheme has a level of compromise resistance equivalent to the Blom's scheme. Users can lock a compromised user without involving the key distribution server.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>the common encryption key based on the numbers b 0 , b 1 , b 2 . The function from the three variables h(x, y, z) is used to find the key. This function is open and known to all participants.</figDesc></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Basic scheme</head><p>We propose a protocol first with only two participants A and B. We use Shamir's scheme to divide the secret <ref type="bibr" target="#b13">[14]</ref>. We limit ourselves to a threshold scheme <ref type="bibr" target="#b2">(3,</ref><ref type="bibr" target="#b3">4)</ref>. The polynomial F (x) of degree 2 is necessary to implement this scheme. All calculations are performed in the ring Z p . p is a prime number.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Piper. Key storage in Secure Networks</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Mitchell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete and Applied Math</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="215" to="228" />
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An optimal class of symmetric key generation systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Blom</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques</title>
				<meeting>of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques</meeting>
		<imprint>
			<date type="published" when="1985">1985</date>
			<biblScope unit="page" from="335" to="338" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Designing secure sensor networks</title>
		<author>
			<persName><forename type="first">E</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perrig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Wireless Communications</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="38" to="43" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Information Theoretic Security</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">V</forename><surname>Poor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shamai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Found. Trends Commun. Inf. Theory</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="355" to="580" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Matrix based key agreement algorithms for sensor networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Parakh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth IEEE In-ternational Conference on Advanced Telecommunication Systems and Networks (ANTS)</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="3" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">ActiveTrust: secure and trustable routing in wireless sensor net-works</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics and Security</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="2013" to="2027" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Approximation algorithms for broadcasting in duty cycled wire-less sensor networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-W</forename><surname>Chin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Raad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Networks</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="2219" to="2236" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Bulk data dissemination in wireless sensor networks: analysis, implications and improvement</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computers</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1428" to="1439" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Mandatory access control implementation in the distributed systems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Belim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Control and Computer Sciences</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1124" to="1126" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The modification of Blom&apos;s key predistribution scheme, taken into account simplex channels</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Belim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Control and Computer Sciences</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1134" to="1137" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Implementation of simplex channels in the Blom&apos;s keys pre-distribution scheme</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Belim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conf. Series</title>
		<imprint>
			<biblScope unit="volume">1210</biblScope>
			<biblScope unit="page">12008</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Use the keys pre-distribution KDP-scheme for mandatory access control implementation</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Belim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conf. Series</title>
		<imprint>
			<biblScope unit="volume">1210</biblScope>
			<biblScope unit="page">12009</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Belim. Vector key pre-distribution scheme</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Belim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conf. Series</title>
		<imprint>
			<biblScope unit="volume">1441</biblScope>
			<biblScope unit="page">12033</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">How to share a secret</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="612" to="613" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
