2012
DOI: 10.1016/j.cam.2011.02.015
|View full text |Cite
|
Sign up to set email alerts
|

A suite of algorithms for key distribution and authentication in centralized secure multicast environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(47 citation statements)
references
References 15 publications
0
47
0
Order By: Relevance
“…However, it also increases the workload of key server by allowing the key server to find a common group key by using CRT for ' n ' number of congruential equations. Naranjo et al [5] presented a key management scheme for three sample applications to provide security and privacy. Vijayakumar et al [21] proposed a ternary tree-based key distribution protocol, which substantially reduced the communication and computation complexities of the key server and the respective group members during the update operations in their key values.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…However, it also increases the workload of key server by allowing the key server to find a common group key by using CRT for ' n ' number of congruential equations. Naranjo et al [5] presented a key management scheme for three sample applications to provide security and privacy. Vijayakumar et al [21] proposed a ternary tree-based key distribution protocol, which substantially reduced the communication and computation complexities of the key server and the respective group members during the update operations in their key values.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the proposed key management scheme, we require that all the m i values selected are prime numbers [19,20,5], [12]. The Initialization block of the sponsor user generates the m i value and provides these values to the other corresponding peer users in a secure manner.…”
Section: (A) Proposed Group Key Management Protocolmentioning
confidence: 99%
“…The fact that the user sends H 1 (T ) instead of T is basically due to the ticket T is private and it should not be known by anyone else since it will be used to access the session key (cf. [6], [12] or [17] for example) but it is necessary to know H 1 (T ) in order to check validity of the license.…”
Section: Service Requestmentioning
confidence: 99%
“…The server broadcasts a new K S that will allow the user to get the service, encrypted using this new private ticket T and the user will get K S as usual in any secure multicast protocol ( [2,21] or [6,12] and [17] for a specific case).…”
Section: Service Requestmentioning
confidence: 99%
See 1 more Smart Citation