2003
DOI: 10.1002/nem.503
|View full text |Cite
|
Sign up to set email alerts
|

A scalable key‐management scheme with minimizing key storage for secure group communications

Abstract: Recently, many group communication services have become the focus for future developments in the Internet and wireless network applications, such as video-conferencing, collaborative work, networking games or online videos. In particular, these applications require data delivery from one sender to a large number of authorized receivers. Therefore, secure multicast communication will become an important networking issue in the future. Using a common encryption key only known by authorized members to encrypt tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…There are two categories of group key establishment protocols: group key distribution protocol [23,25,39,40] and group key agreement protocol [5,19,29,41]. In the group key distribution protocol, the group key is created by one party and securely transmitted to other parties.…”
Section: Introductionmentioning
confidence: 99%
“…There are two categories of group key establishment protocols: group key distribution protocol [23,25,39,40] and group key agreement protocol [5,19,29,41]. In the group key distribution protocol, the group key is created by one party and securely transmitted to other parties.…”
Section: Introductionmentioning
confidence: 99%
“…The combination of forward and backward confidentiality yields key independence. The definitions of forward confidentiality and backward confidentiality are described as follows (Iolus, 1997;Wong et al, 2000;Tseng, 2003;Rhee et al, 2004):…”
Section: Joining/leaving Proceduresmentioning
confidence: 99%
“…This is because in LKH, each multicast session is considered separately and this causes a lot of unnecessary keys to be stored by the GC. Although there are several work on minimisation of key at the GC side, which can minimise these effects [14,15], the members still require a significant amount of storage if each multicast session is considered separately; the more services the members subscribe to, the more redundant keys the members need to store. As for MLB-LKH, the difference in key storage between the members is at most m. From Figure 7(b), we can see that in LKH, the members in the highest layer store thrice the number of keys than the members in MLB-LKH.…”
Section: Simulations and Performance Comparisonmentioning
confidence: 99%