2010 Fifth International Conference on Internet and Web Applications and Services 2010
DOI: 10.1109/iciw.2010.61
|View full text |Cite
|
Sign up to set email alerts
|

Simple ID-Based Key Distribution Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…In this approach, Huffman binary tree is used to distribute and manage keys in VO and complete binary tree is used to manage keys in administrative domain. Park, (Park et al, 2010) have proposed an ID-based key distribution scheme that uses cryptographic algorithms to offer security and offer scalability. Li (Li et al, 2008) have proposed an authenticated encryption mechanism for group communication with basic characteristics of group communication in grid in terms of the basic theory of threshold signature.…”
Section: Related Workmentioning
confidence: 99%
“…In this approach, Huffman binary tree is used to distribute and manage keys in VO and complete binary tree is used to manage keys in administrative domain. Park, (Park et al, 2010) have proposed an ID-based key distribution scheme that uses cryptographic algorithms to offer security and offer scalability. Li (Li et al, 2008) have proposed an authenticated encryption mechanism for group communication with basic characteristics of group communication in grid in terms of the basic theory of threshold signature.…”
Section: Related Workmentioning
confidence: 99%
“…In this the first level provides flexible and secure group communication and the second level provides hierarchical access control. Park et al (2010) have proposed an ID-based key distribution scheme which is secure against session state reveal attacks and long-term key reveal attacks. Also, our scheme offers the scalability, non-usage of additional cryptographic algorithms and efficiency similar to those of the existing schemes.…”
Section: Methodsmentioning
confidence: 99%