2010
DOI: 10.1002/nem.742
|View full text |Cite
|
Sign up to set email alerts
|

A key management scheme for secure group communication using binomial key trees

Abstract: SUMMARYNumerous emerging applications, such as teleconferencing, board meetings, pay-per-view and scientifi c discussions, rely on a secure group communication model. Scalable group rekeying is an important issue in the secure group communication model as the nature of the group is dynamic. The number of encryptions performed and rekey messages constructed should be minimized to carry out updating of the group key, and secure delivery of the group key should be carried out in an effi cient manner. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…In this sense, improved OFT scheme loses its intended advantage over LKH. Then, a centralized group key management scheme based on binomial key tree was proposed by Aparna et al [1]. The number of encryptions required for rekeying is log 2 n + 1 when a new user joins and 2 log 2 n − h − 1 (h = log 2 n/2 is the average height of the binomial key tree) when an existing user leaves the group.…”
Section: Tree Based Gkm Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this sense, improved OFT scheme loses its intended advantage over LKH. Then, a centralized group key management scheme based on binomial key tree was proposed by Aparna et al [1]. The number of encryptions required for rekeying is log 2 n + 1 when a new user joins and 2 log 2 n − h − 1 (h = log 2 n/2 is the average height of the binomial key tree) when an existing user leaves the group.…”
Section: Tree Based Gkm Schemesmentioning
confidence: 99%
“…In this section, the proposed group key management scheme is compared with some of the existing efficient tree based group key management schemes by Wong et al [21], Ku and Chen [11] and Aparna et al [1]. As discussed in section 2.1, the number of key changes, encryptions and rekey messages required for rekeying in these schemes upon user join/leave depends on the number of users in the group.…”
Section: Comparisons With Existing Tree Based Group Key Management Scmentioning
confidence: 99%
See 1 more Smart Citation
“…It handles only simultaneous leave operations. In References 16, 17, a binomial key tree (BKT) concept is used to manage a secure group and authors address the rekeying costs involved during join and leave operations. It is shown that the scheme is efficient in terms of the computation and communication costs.…”
Section: Introductionmentioning
confidence: 99%
“…It is shown that the scheme is efficient in terms of the computation and communication costs. In this paper, we address bursty behavior in SGC using the BKT scheme proposed in References 16, 17. We compute the number of new keys generated, encryptions performed, and rekey messages constructed for the worst case scenario.…”
Section: Introductionmentioning
confidence: 99%