2020
DOI: 10.1007/s11042-020-08904-8
|View full text |Cite|
|
Sign up to set email alerts
|

A Computationally Efficient and Scalable Key Management Scheme for Access Control of Media Delivery in Digital Pay-TV Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 68 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Tysowski et al 20 proposed a GKM scheme based on proxy re‐encryption in cloud deployment. Vijayakumar et al 21 (as well as Kumar et al 22 ) presented a dual group‐based scheme using the Chinese remainder theorem (CRT) in vehicular ad‐hoc networks along with the fingerprint authentication of vehicles. This scheme is claimed to be efficient for computational cost in dual key management.…”
Section: Related Workmentioning
confidence: 99%
“…Tysowski et al 20 proposed a GKM scheme based on proxy re‐encryption in cloud deployment. Vijayakumar et al 21 (as well as Kumar et al 22 ) presented a dual group‐based scheme using the Chinese remainder theorem (CRT) in vehicular ad‐hoc networks along with the fingerprint authentication of vehicles. This scheme is claimed to be efficient for computational cost in dual key management.…”
Section: Related Workmentioning
confidence: 99%
“…The group key management is two types such as key agreement and key distribution. In key agreement, all nodes in the group calculate a public key utilizing certain public limits 6,7 . An integrated ability and reliable third party occurs in key distribution, to allocate group keys to all nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In key agreement, all nodes in the group calculate a public key utilizing certain public limits. 6,7 An integrated ability and reliable third party occurs in key distribution, to allocate group keys to all nodes. Hence, group key agreement is feasible over key distribution for safe communication.…”
Section: Introductionmentioning
confidence: 99%