Proceedings of the 45th Annual Southeast Regional Conference 2007
DOI: 10.1145/1233341.1233389
|View full text |Cite
|
Sign up to set email alerts
|

Chinese remainder theorem based group key management

Abstract: In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we optimize the number of re-key broadcast messages, user-side key computation, and number of key storages. The first protocol is the base Chinese Remaindering Group Key (CRGK) protocol, which with a group of n users requires the key server to do O(n) XORs, additions, multiplications, and Extended Euclidean Algorithm computations and broa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(45 citation statements)
references
References 19 publications
0
42
0
1
Order By: Relevance
“…Zheng et al [19] proposed two centralized CRT-based group key management protocols. The key advantage of their approach is that the total count of broadcast messages to distribute the group key to the user is drastically minimized.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Zheng et al [19] proposed two centralized CRT-based group key management protocols. The key advantage of their approach is that the total count of broadcast messages to distribute the group key to the user is drastically minimized.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the proposed key management scheme, we require that all the m i values selected are prime numbers [19,20,5], [12]. The Initialization block of the sponsor user generates the m i value and provides these values to the other corresponding peer users in a secure manner.…”
Section: (A) Proposed Group Key Management Protocolmentioning
confidence: 99%
“…IP camera systems can be composed in a closed way with the network not being exposed outwards. However, when only one IP camera is installed at a distant place or a few cameras are installed to use, invasion detection and blocking systems, which are generalized in general networks, are not composed in IP cameras and they can be vulnerable to packet sniffing and complete survey attacks by encoding and transmitting user passwords in general encoding methods [11][12][13].…”
Section: Ip Camera Systemmentioning
confidence: 99%
“…In the recent years, various authors have proposed privacy preserving authentication schemes for secure message communication. The two most common privacy preserving authentication schemes are the pseudonyms based privacy preserving scheme [4][5][6][7][8][9][10][11][12]22, 24], the group signature based privacy preserving scheme [13][14][15][16][17]. Each scheme provides solution to the secure privacy preserving message communication problems in VANET but all of them have some drawbacks.…”
Section: Introductionmentioning
confidence: 99%