2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS) 2009
DOI: 10.1109/ants.2009.5409894
|View full text |Cite
|
Sign up to set email alerts
|

Secure group communication using binomial trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…When u new joins the group, a single binomial subtree S′ 6 is obtained and is shown in Figure 9(b). In Figure 9(b) h = 6 and the members of binomial subtree S 3 require keys of binomial subtrees S′ 4 , S′ 5 and S′ 6 . The key of binomial subtree S′ 6 is encrypted with the old group key, the binomial subtree key of S′ 5 is encrypted using the binomial subtree key of S′ 4 , and the binomial subtree key of S′ 4 is encrypted with the binomial subtree key of S 3 .…”
Section: N Oddmentioning
confidence: 99%
“…When u new joins the group, a single binomial subtree S′ 6 is obtained and is shown in Figure 9(b). In Figure 9(b) h = 6 and the members of binomial subtree S 3 require keys of binomial subtrees S′ 4 , S′ 5 and S′ 6 . The key of binomial subtree S′ 6 is encrypted with the old group key, the binomial subtree key of S′ 5 is encrypted using the binomial subtree key of S′ 4 , and the binomial subtree key of S′ 4 is encrypted with the binomial subtree key of S 3 .…”
Section: N Oddmentioning
confidence: 99%
“…Schemes based on LKH use hierarchical key tree to manage secure groups. BLKH scheme manages secure groups by maintaining Binomial Key Trees [BKTs] to store node information and key information [4]. Based on the number of members in the cluster, the BKT consists of multiple binomial subtrees that are rooted at different nodes.…”
Section: Blkh Schemementioning
confidence: 99%
“…Here, we consider the value of h = log 2 N , which is the maximum possible value and in case of leave event, h l denotes the height of the last binomial subtree before user leaves the group. Different cases depicted in Table I are explained in detail in References 16, 17.…”
Section: Binomial Treementioning
confidence: 99%
“…It handles only simultaneous leave operations. In References 16, 17, a binomial key tree (BKT) concept is used to manage a secure group and authors address the rekeying costs involved during join and leave operations. It is shown that the scheme is efficient in terms of the computation and communication costs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation