IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer A 1999
DOI: 10.1109/infcom.1999.751455
|View full text |Cite
|
Sign up to set email alerts
|

Key management for secure lnternet multicast using Boolean function minimization techniques

Abstract: The Internet today provides no support for privacy or authentication of multicast packet. However, an increasing number of applications will require secure multicast senices in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocoL This is particularly true with regard to the handling of group membership changes, such as member departures and/or expul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
165
0
4

Year Published

2001
2001
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 143 publications
(169 citation statements)
references
References 6 publications
0
165
0
4
Order By: Relevance
“…[4][5][6]. Note that we use ⊕ and ⊗ to denote modular polynomial addition and multiplication over Galois Field GF(2 n ), respectively: P(X) = P(U n7 ) ⊗ P(U n8 ) ⊗ P(k c ') ⊕ P(S n3 ') P(Y) = P(S n1 ) ⊗ P(S n2 ) ⊗ P(S n3 ') ⊗ P(kc') ⊕ P(R n ') (4) P(S n3 ') = P(X) mod P(U n7 ) P(S n3 ') = P(X) mod P(U n8 )…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…[4][5][6]. Note that we use ⊕ and ⊗ to denote modular polynomial addition and multiplication over Galois Field GF(2 n ), respectively: P(X) = P(U n7 ) ⊗ P(U n8 ) ⊗ P(k c ') ⊕ P(S n3 ') P(Y) = P(S n1 ) ⊗ P(S n2 ) ⊗ P(S n3 ') ⊗ P(kc') ⊕ P(R n ') (4) P(S n3 ') = P(X) mod P(U n7 ) P(S n3 ') = P(X) mod P(U n8 )…”
Section: Methodsmentioning
confidence: 99%
“…Among them are group key approach [1][2][3] , contributory key agreement supported by Diffie Hellman algorithm [4] , and logical key tree based approach [5,6] . Among the group re-keying methods mentioned above, SKM [1] is one method that does not depend on encryption/decryption for its group re-keying process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Extending this to M-ary reduces the height of the tree by reducing the number of keys at each node. In [9], two keys are maintained at every level of tree, extending the scheme to M-ary m keys will be maintained.…”
Section: Motivationmentioning
confidence: 99%
“…To reduce the cost of key redistribution batch rekeying mechanism is used. This paper focuses on "cumulative member removal" [3] algorithm which uses Boolean minimization techniques to minimize the number of messages required to distribute new keys to the existing group members in a secure manner.…”
Section: Introductionmentioning
confidence: 99%