2004
DOI: 10.1007/978-3-540-24679-4_148
|View full text |Cite
|
Sign up to set email alerts
|

Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2004
2004
2008
2008

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Therefore, the proposed method of cryptanalysis can balance time complexity |T | < 2 B /M and requirement on exposure probability P (SUCC) by choosing an appropriate M . By considering a case study of h = 20 thus N being around one million (which is a reasonable assumption for practical large-scale multicast applications), we have constructed very interesting magic numbers concerning [8] [9] and got some satisfactory T -P (SUCC) results to support the above tradeoff theory, i.e., both values being fairly acceptable. Due to limit of space, numerical analysis is not included in this article.…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 73%
See 3 more Smart Citations
“…Therefore, the proposed method of cryptanalysis can balance time complexity |T | < 2 B /M and requirement on exposure probability P (SUCC) by choosing an appropriate M . By considering a case study of h = 20 thus N being around one million (which is a reasonable assumption for practical large-scale multicast applications), we have constructed very interesting magic numbers concerning [8] [9] and got some satisfactory T -P (SUCC) results to support the above tradeoff theory, i.e., both values being fairly acceptable. Due to limit of space, numerical analysis is not included in this article.…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 73%
“…This lies in that the collision M | h i=0 R i tends to be less likely to occur than that of M | N i=1 f i , due to the number of large random multipliers involved (h + 1 compared with N ). However, we note that the outsider attack presented in Section II-A is still applicable to [8] [9] considering large multicast groups with a not too small h. This is owing to the scenario's t-M tradeoff (actually, T -P (SUCC) tradeoff) feature lying in a relationship similar to (7), herein cs =cs + tM .…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 90%
See 2 more Smart Citations
“…Using key trees, the number of messages to be sent are reduced to the order of the logarithm of the number of VPG nodes, so the VPG-SA reduces the rekeying time. A specially suitable algorithm for Grid environments was proposed by some of the authors in [12] and more detailed explanation about this topic can be found in [2].…”
Section: Vpg Security Architecturementioning
confidence: 99%