2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934999
|View full text |Cite
|
Sign up to set email alerts
|

Secure group key management using uni-directional proxy re-encryption schemes

Abstract: The group key management is for a group manager to maintain a consistent group key for a dynamic group of members through a broadcast channel. In this paper we propose a group key management scheme based on a meta proxy re-encryption (PRE) scheme. In particular, we propose an RSA-based PRE scheme with special properties. It is the first RSA-based PRE scheme for group key management and has the desired properties of uni-directionality and multi-hop.In our group key management scheme, each group member holds jus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 37 publications
(34 citation statements)
references
References 24 publications
0
34
0
Order By: Relevance
“…Each participating member holds the proxy re-encryption keys from the root to the leaf member. In two of the aforementioned studies [16,17], to construct a logical tree of keys, the parent members are computed from child members; consequently, members must be synchronized, otherwise any delay can cause an interruption in a protocol run. Additionally, during the setup time, both protocols depend upon a leader; in other words, a single-point failure may still arise in the system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Each participating member holds the proxy re-encryption keys from the root to the leaf member. In two of the aforementioned studies [16,17], to construct a logical tree of keys, the parent members are computed from child members; consequently, members must be synchronized, otherwise any delay can cause an interruption in a protocol run. Additionally, during the setup time, both protocols depend upon a leader; in other words, a single-point failure may still arise in the system.…”
Section: Related Workmentioning
confidence: 99%
“…This section analyzes the efficiency of SGRS in terms of computational and message complexity against earlier works [13][14][15][16][17]. We consider that encryption should protect all types of keying materials exchanged among group members.…”
Section: B Efficiency Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The number of users is often large in cloud-based services. One solution to deal with this issue is to apply a treebased group key management (GKM) scheme [10,11,28] to maintain the common distribution-key among a dynamic set of users at each class. The GKM scheme reduces the computation and communication cost from O(n i ) to O(lg n i ), where n i is the number of users in SC i .…”
Section: Scalable Rekey Mechanism For Large Number Of Usersmentioning
confidence: 99%
“…The GKM scheme reduces the computation and communication cost from O(n i ) to O(lg n i ), where n i is the number of users in SC i . In particular, the GKM schemes in [10,11] have an efficient rekey mechanism for a user who may miss key update messages in his off-line period. The methods are suitable in handing frequent rekey operations.…”
Section: Scalable Rekey Mechanism For Large Number Of Usersmentioning
confidence: 99%