2005
DOI: 10.1007/11552055_3
|View full text |Cite
|
Sign up to set email alerts
|

Self-healing Key Distribution Schemes with Sponsorization

Abstract: Abstract. In a self-healing key distribution scheme a group manager enables a large and dynamic group of users to establish a group key over an unreliable network. The group manager broadcasts in every session some packet of information in order to provide a common key to members of the session group. The goal of self-healing key distribution schemes is that, even if the broadcast is lost in a certain session, the group member can recover the key from the broadcast packets received before and after the session… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(27 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…The three problems were inconsistent robustness, high overhead and expensive maintenance costs. Sáez in [4] considered the possibility that a coalition of users sponsor a user outside the group for one session. Muhammad et al in [5] considered the possibility of idea of mutual-healing.…”
Section: A Self-healing Key Distribution Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…The three problems were inconsistent robustness, high overhead and expensive maintenance costs. Sáez in [4] considered the possibility that a coalition of users sponsor a user outside the group for one session. Muhammad et al in [5] considered the possibility of idea of mutual-healing.…”
Section: A Self-healing Key Distribution Schemesmentioning
confidence: 99%
“…Generally speaking, bilinear pairing computation is more time-consuming than scalar multiplication, let alone addition, hash and XOR operation. Therefore, the main computation overhead comes form (4).…”
Section: B Analysis Of Efficiencymentioning
confidence: 99%
“…However, these hash chain based constructions have the fatal defect of not being collusion resistant in the sense that the collusion between new joined users and the revoked users are able to recover all the session keys which they are not entitled to. Among the collusion resistance self-healing key distribution schemes [2], [3], [12], [13], [16], [17], only [17] is hash chain based and uses the same self-healing mechanism as introduced in [5]. We address the problem of achieving collusion resistance for [5] following the approach of [17], with better efficiency gains in computation and storage.…”
Section: Introductionmentioning
confidence: 99%
“…Further improvements in efficiency are obtained by relaxing the security slightly -from unconditional to computational [8], [5], [10]. The schemes [12], [13], [17] are based on vector space access structure instead of Shamir's [14] secret sharing. The hash chain based schemes [8], [5], [10] are computationally secure and are highly efficient compared to the existing unconditionally secure schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation