Efficient tree-based revocation in groups of low-state devices
We study the problem of broadcasting confidential information to a collection of n devices
while providing the ability to revoke an arbitrary subset of those devices (and tolerating …
while providing the ability to revoke an arbitrary subset of those devices (and tolerating …
Reliable group rekeying: A performance analysis
In secure group communications, users of a group share a common group key. A key server
sends the group key to authorized new users as well as performs group rekeying for group …
sends the group key to authorized new users as well as performs group rekeying for group …
Scalable secure group communication over IP multicast
S Banerjee, B Bhattacharjee - IEEE Journal on selected areas …, 2002 - ieeexplore.ieee.org
We introduce and analyze a scalable rekeying scheme for implementing secure group
communications Internet protocol multicast. We show that our scheme incurs constant …
communications Internet protocol multicast. We show that our scheme incurs constant …
Dynamics of key management in secure satellite multicast
MP Howarth, S Iyengar, Z Sun… - IEEE journal on …, 2004 - ieeexplore.ieee.org
Security is an important concern in today's information age and particularly so in satellite
systems, where eavesdropping can be easily performed. This paper addresses efficient key …
systems, where eavesdropping can be easily performed. This paper addresses efficient key …
Protocol design for scalable and reliable group rekeying
XB Zhang, SS Lam, DY Lee… - IEEE/ACM Transactions …, 2003 - ieeexplore.ieee.org
We present the design and specification of a protocol for scalable and reliable group
rekeying together with performance evaluation results. The protocol is based upon the use …
rekeying together with performance evaluation results. The protocol is based upon the use …
Efficient and secure keys management for wireless mobile communications
This paper presents an efficient algorithm for the secure group key management of mobile
users. The most promising protocols to deal with group key management are those based …
users. The most promising protocols to deal with group key management are those based …
Computation-efficient multicast key distribution
Efficient key distribution is an important problem for secure group communications. The
communication and storage complexity of multicast key distribution problem has been …
communication and storage complexity of multicast key distribution problem has been …
Bridging broadcast encryption and group key agreement
Q Wu, B Qin, L Zhang, J Domingo-Ferrer… - Advances in Cryptology …, 2011 - Springer
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of
members but requires a trusted party to distribute decryption keys. Group key agreement …
members but requires a trusted party to distribute decryption keys. Group key agreement …
Secure and efficient group key management with shared key derivation
JC Lin, KH Huang, F Lai, HC Lee - Computer Standards & Interfaces, 2009 - Elsevier
In many network applications, including distant learning, audio webcasting, video streaming,
and online gaming, often a source has to send data to many receivers. IP multicasts and …
and online gaming, often a source has to send data to many receivers. IP multicasts and …
SAKM: a scalable and adaptive key management approach for multicast communications
Y Challal, H Bettahar, A Bouabdallah - ACM SIGCOMM Computer …, 2004 - dl.acm.org
Multicasting is increasingly used as an efficient communication mechanism for group-
oriented applications in the Internet. In order to offer secrecy for multicast applications, the …
oriented applications in the Internet. In order to offer secrecy for multicast applications, the …