2013 Conference on Networked Systems 2013
DOI: 10.1109/netsys.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
27
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(27 citation statements)
references
References 23 publications
0
27
0
Order By: Relevance
“…Hybrid group key management schemes [29][30][31][32] are about the best use of both schemes: a centralized distribution scheme and a distributed key agreement scheme. Lastly, a self-healing group key distribution scheme (SGKD) is for wireless networks including sensor networks [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48][49][50]. In this paper, we focus on SGKD schemes because SISS's application includes both networks of wired and wireless and SISS has more relations with SGKD schemes than other schemes.…”
Section: Related Work and Applicationmentioning
confidence: 99%
See 2 more Smart Citations
“…Hybrid group key management schemes [29][30][31][32] are about the best use of both schemes: a centralized distribution scheme and a distributed key agreement scheme. Lastly, a self-healing group key distribution scheme (SGKD) is for wireless networks including sensor networks [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48][49][50]. In this paper, we focus on SGKD schemes because SISS's application includes both networks of wired and wireless and SISS has more relations with SGKD schemes than other schemes.…”
Section: Related Work and Applicationmentioning
confidence: 99%
“…The main point of self-healing schemes is that group members can recover the missing session keys without retransmission of the missing messages from the GM (group manager). A SGKD scheme is largely divided into four categories again: polynomial based SGKD (P-SGKD) schemes [33][34][35][36][37], vector space secret sharing based SGKD schemes [38][39][40][41], bilinear pairings based SGKD schemes [42,43], and exponential arithmetic based SGKD (E-SGKD) schemes [44][45][46][47][48][49][50][51]. P-SGKD and vector space secret sharing based SGKD schemes are generally known as "not efficient".…”
Section: Related Work and Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…After Staddon’s first self-healing group key distribution (SGKD) scheme, many SGKD schemes were proposed. Up to now, four kinds of SGKD schemes exist: polynomial based SGKD (P-SGKD) schemes [ 2 , 3 , 4 , 5 , 6 ], vector space secret sharing based SGKD schemes [ 7 , 8 , 9 , 10 ], bilinear pairings based SGKD schemes [ 11 , 12 , 13 ] and exponential arithmetic based SGKD (E-SGKD) schemes [ 1 , 2 , 14 , 15 ]. Among them, vector space secret sharing based SGKD schemes and the bilinear pairings based SGKD schemes are inefficient compared with the other two in terms of the storage overhead and the communication cost.…”
Section: Introductionmentioning
confidence: 99%
“…Other techniques, such as subset difference re-keying [ 21 ], bilinear pairings [ 22 , 23 ], vector space secret sharing [ 24 , 25 ] and the exponential arithmetic [ 26 ], are also used to design SGKD schemes.…”
Section: Introductionmentioning
confidence: 99%