2009 First International Communication Systems and Networks and Workshops 2009
DOI: 10.1109/comsnets.2009.4808860
|View full text |Cite
|
Sign up to set email alerts
|

Key management scheme for multi-layer secure group communication

Abstract: Many emerging applications are based on group communication model and many group communications Uke multimedia distribution and miUtary applications require a security infrastrocture that provides multiple levels of access control for group members in which group members are divided into a number of subgroups and placed at ditTerent privilege levels based on certain criteria and a member at higher level must be capable of accessing communication in its own level as well as its descendant lower levels and conve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(20 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…Our scheme is share‐based scheme where shares are chosen from GF ( p ). The scheme in made an effort to reduce the storage, but the scheme is share and key based.…”
Section: Analysis Results and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Our scheme is share‐based scheme where shares are chosen from GF ( p ). The scheme in made an effort to reduce the storage, but the scheme is share and key based.…”
Section: Analysis Results and Comparisonmentioning
confidence: 99%
“…in and by Aparna et al . in , which are based on threshold secret‐sharing method. We show that our scheme is efficient in terms of storage and the rekeying cost in comparison with the schemes in and .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, it finds the keys required for encrypting the changed keys by using Boolean function minimization technique. In Reference 15, the scheme proposed in Reference 11 has been extended to m ‐ ary tree and authors propose algorithms for single leave, two members leave, and multiple members leave events. It handles only simultaneous leave operations.…”
Section: Introductionmentioning
confidence: 99%
“…We construct individual key trees for different layers and then integrate them. We use the same model that is explained for Dexter et al scheme and try to reduce the amount of storage required at both KDC and users [22]. For auxiliary keys, we use random elements, and we compute the group keys as described below.…”
Section: Proposed Key Management Scheme For Multilayer Sgcmentioning
confidence: 99%