2004
DOI: 10.1002/nem.515
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and lightweight key distribution for secure group communications

Abstract: Securing group communications in dynamic and large-scale groups is more complex than securing one-to-one communications due to the inherent scalability issue of group key management. In particular, cost for key establishment and key renewing is usually relevant to the group size and subsequently becomes a performance bottleneck in achieving scalability. To address this problem, this paper proposes a new approach that features decoupling of group size and computation cost for group key management. By using a hi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 31 publications
0
10
0
Order By: Relevance
“…In Group Key Management Protocol, the KDC (Lee and Shieh, 2004;Al-Talib et al, 2009;David Manz et al,2010) helps the first member to join the group and creates a Group Key Packet (GKP) that consists of a Group Traffic Encryption Key (GTEK) and a Group Key Encryption Key (GKEK). The KDC sends a copy of the GKP whenever a new member wants to join the group.…”
Section: Related Workmentioning
confidence: 99%
“…In Group Key Management Protocol, the KDC (Lee and Shieh, 2004;Al-Talib et al, 2009;David Manz et al,2010) helps the first member to join the group and creates a Group Key Packet (GKP) that consists of a Group Traffic Encryption Key (GTEK) and a Group Key Encryption Key (GKEK). The KDC sends a copy of the GKP whenever a new member wants to join the group.…”
Section: Related Workmentioning
confidence: 99%
“…, i. The new group key, S′ h , is encrypted with the old group key, the 10 , k 9-10 , k 1-11 } {k 9 , k 9-10 ,k 1-11 } {k 11 , and u new key of binomial subtree S′ t is encrypted with the key of binomial subtree S′ t−1 , t = h − 1, h − 2, . .…”
Section: N Oddmentioning
confidence: 99%
“…• new keys generated are, group key K′ 1-9 , binomial subtree keys K 5-9 , K [8][9] . Thus, h = 3 new keys are generated; • number of encryptions performed: 2h = 6; and • number of rekey messages constructed: h + 1 = 4.…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…All these schemes deal solely with the node-level dynamics. Conversely, there are many key management schemes which are good at supporting user groups and copying with user-level dynamics [30][31][32]. However, few of these schemes can handle both node-level and user-level dynamics efficiently.…”
Section: Related Workmentioning
confidence: 99%