Videoconferencing on the Internet
IEEE/ACM Transactions on Networking (TON)
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
WebCanal: a multicast Web application
Selected papers from the sixth international conference on World Wide Web
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Parity-based loss recovery for reliable multicast transmission
IEEE/ACM Transactions on Networking (TON)
Performance comparison of centralized versus distributed error recovery for reliable multicast
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A Distributed Key Management Protocol for Dynamic Groups
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
On key distribution in secure multicasting
LCN '00 Proceedings of the 25th Annual IEEE Conference on Local Computer Networks
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
An Algorithm to Compute Collusion Paths
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A Dual Encryption Protocol for Scalable Secure Multicasting
ISCC '99 Proceedings of the The Fourth IEEE Symposium on Computers and Communications
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A Secure Group Key Management Communication Lower Bound
A Secure Group Key Management Communication Lower Bound
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Efficient verifier-based password-authenticated key exchange in the three-party setting
Computer Standards & Interfaces
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A Survey of Application-Layer Multicast Protocols
IEEE Communications Surveys & Tutorials
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Journal of Computational and Applied Mathematics
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. In this paper, a new group key management protocol is proposed to reduce the communication and computation overhead of group key rekeying caused by membership changes. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The proposed protocol is shown to be secure and immune to collusion attacks, and it outperforms the other comparable protocols from our analysis and simulation. The protocol is particularly efficient with binary key trees and asynchronous rekeying, and it can be tuned to meet different rekeying delay or key size requirements.