International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003. 2003
DOI: 10.1109/itre.2003.1270619
|View full text |Cite
|
Sign up to set email alerts
|

Improved LKH for batch rekeying in multicast groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Therefore, the proposed method of cryptanalysis can balance time complexity |T | < 2 B /M and requirement on exposure probability P (SUCC) by choosing an appropriate M . By considering a case study of h = 20 thus N being around one million (which is a reasonable assumption for practical large-scale multicast applications), we have constructed very interesting magic numbers concerning [8] [9] and got some satisfactory T -P (SUCC) results to support the above tradeoff theory, i.e., both values being fairly acceptable. Due to limit of space, numerical analysis is not included in this article.…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 95%
See 2 more Smart Citations
“…Therefore, the proposed method of cryptanalysis can balance time complexity |T | < 2 B /M and requirement on exposure probability P (SUCC) by choosing an appropriate M . By considering a case study of h = 20 thus N being around one million (which is a reasonable assumption for practical large-scale multicast applications), we have constructed very interesting magic numbers concerning [8] [9] and got some satisfactory T -P (SUCC) results to support the above tradeoff theory, i.e., both values being fairly acceptable. Due to limit of space, numerical analysis is not included in this article.…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 95%
“…In [8] [9], Pegueroles et al proposed a hierarchical multicast key management scheme based on an updatable binary key tree. The scheme employs a generalized rekey message as:…”
Section: B Weakness In the Remainder Approach -Variantmentioning
confidence: 99%
See 1 more Smart Citation
“…The LKH has an advantage that it can use the key of the middle node as the key of the partial group by using this logical hierarchical structure [19]. …”
Section: Logical Key Hierarchy (Lkh)mentioning
confidence: 99%
“…There are two typical methods for group key distribution: schemes based on logical key hierarchy tree (LKH) [2,10] and schemes that are one-way function tree (OFT) [11,12] based, named as top-down method and bottom-up method respectively in Ref. [12].…”
Section: Existing Workmentioning
confidence: 99%