2001
DOI: 10.1002/nem.412
|View full text |Cite
|
Sign up to set email alerts
|

Secure key agreement for group communications

Abstract: A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of group members and the privacy of group messages, and provides the properties of perfect forward and backward privacy. In a group session, the common key is collaboratively established by all participants, hence the overhead of key agreement is balanced among group members.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2005
2005
2008
2008

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…With a hierarchy of keys, there are different ways to construct rekey messages and securely distribute these to the users 7 . Three rekeying strategies: User-oriented, key-oriented, and group-oriented were investigated.…”
Section: Methodsmentioning
confidence: 99%
“…With a hierarchy of keys, there are different ways to construct rekey messages and securely distribute these to the users 7 . Three rekeying strategies: User-oriented, key-oriented, and group-oriented were investigated.…”
Section: Methodsmentioning
confidence: 99%
“…Node secrets need to be securely distributed to all the users of a class in an efficient and scalable way. Few existing CHAC schemes have dealt with this issue; instead they assume that there is a key distribution scheme which can distribute node secrets to its users securely [12][13][14]. A comprehensive survey of group key management schemes for secure group communication can be found in Zou et al [15].…”
Section: Introductionmentioning
confidence: 99%
“…The centralized schemes cannot achieve "1 affects n" scalability because they do not rely on any intermediate nodes such as routers to perform access control and key distribution. Distributed schemes [4,5,6] delegate key generation overhead evenly among all members of the group. These schemes would be vulnerable to security attacks from inside the group because of trusting all group members.…”
Section: Introductionmentioning
confidence: 99%