2017
DOI: 10.1016/j.comcom.2016.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…Chen Y.R. et al [19] proposed KeyDer-GKM based on a semi-stateful rekey mechanism to reduce the number of decryption operations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen Y.R. et al [19] proposed KeyDer-GKM based on a semi-stateful rekey mechanism to reduce the number of decryption operations.…”
Section: Related Workmentioning
confidence: 99%
“…Scholars have proposed many lightweight protocols to balance security and efficiency. On the one hand, some protocols simplify the process of key distribution, or use dynamic routing and maximum distance separable code to distribute key update messages [15][16][17][18][19]. On the other hand, based on threshold secret sharing scheme [20,21], lightweight encryption and decryption algorithms are implemented to replace the traditional encryption algorithms used in LKH and OFT schemes [9,[22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…An early example is the "audio teleconference system" of Steer et al [49], and the seminal academic work is perhaps Wallner et al [52] or Wong et al [54]. Later examples include [7,9,12,17,26,27,28,29,30,33,42,43,55], among many others. These protocols assign private DH keys to leaves of a binary 1 tree, defining (i) д xy as the secret key of a node whose two children have secret keys x and y, and (ii) д д xy as its public or 'blinded' key.…”
Section: Other Group Messaging Protocolsmentioning
confidence: 99%
“…We remark on two main techniques to avoid trivial denials of service, though a perfect solution is an open research question (studied e.g. by [12]) and we consider it out of scope for our work.…”
Section: Executabilitymentioning
confidence: 99%
“…7,8,14,16,18,19 That is, during a certain session, even if some broadcast packets get lost, users are still capable of recovering the group key, for that session, simply by using the packets they will receive at the beginning of a subsequent one, without requesting additional transmission from the GM. 12,20 This approach decreases the work load on the GM and reduces network traffic as well as the risk of user exposure through traffic analysis. 7,8,12,17 Self-healing group key distribution protocols can broadly be classified into polynomial-based, exponential arithmetic-based, vector space secret sharing scheme-based, and bilinear pairing-based schemes.…”
Section: Introductionmentioning
confidence: 99%