“…A number of approaches have been proposed and has grown up in different directions: rekeying schemes for dynamic groups, broadcast schemes with tracing capability, users revocation from a predefined subset of users etc. A few of them are [2,3,5,6,7,8,10,11,13,15,16,17,18,19,20,21,23,24,25,26,27]. However, the underlying networks are assumed to be reliable in all the above works.…”