2005
DOI: 10.1007/11586821_23
|View full text |Cite
|
Sign up to set email alerts
|

On Threshold Self-healing Key Distribution Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(42 citation statements)
references
References 9 publications
0
42
0
Order By: Relevance
“…After that, many papers have appeared which generalize and/or modify the original definitions, give lower bounds to the resources required for such schemes, and propose some efficient constructions. See [6,3,7,4] for some relevant papers on self-healing key distribution schemes. Typically a self-healing key distribution scheme consists of the following algorithms.…”
Section: Self-healing Key Distribution With Revocationmentioning
confidence: 99%
“…After that, many papers have appeared which generalize and/or modify the original definitions, give lower bounds to the resources required for such schemes, and propose some efficient constructions. See [6,3,7,4] for some relevant papers on self-healing key distribution schemes. Typically a self-healing key distribution scheme consists of the following algorithms.…”
Section: Self-healing Key Distribution With Revocationmentioning
confidence: 99%
“…A number of approaches have been proposed and has grown up in different directions: rekeying schemes for dynamic groups, broadcast schemes with tracing capability, users revocation from a predefined subset of users etc. A few of them are [2,3,5,6,7,8,10,11,13,15,16,17,18,19,20,21,23,24,25,26,27]. However, the underlying networks are assumed to be reliable in all the above works.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, they proposed a new definition, gave lower bounds on it and proposed some constructions under the definition. Saez [12] generalized previous definitions from another perspective, gave some lower bounds and proposed a general construction. Hong and Kang [13] proposed a self-healing scheme which optimizes the storage overhead according to the lower bounds given in [11].…”
Section: Related Workmentioning
confidence: 99%
“…According to [9], for a lost key distribution broadcast which contains the current session key, a user can recover the lost key by combining information from any key distribution broadcast preceding the lost broadcast with information from any key distribution broadcast following it, as long as the user is a group member in the sessions corresponding to these three broadcasts. Since [9], many self-healing key distribution schemes have been proposed in the literature [10,11,12,13,14,15,16,17,18,19,20].…”
Section: Introductionmentioning
confidence: 99%