CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Communications of the ACM
Multimedia Systems, Standards and Networks
Multimedia Systems, Standards and Networks
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
An Efficient Key Management Algorithm for Hierarchical Group Communication
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Multi-layer key management for secure multimedia multicast communications
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
Hi-index | 0.00 |
Many emerging applications are based on group communication model and many group communications like multimedia distribution and military applications require a security infrastrocture that provides multiple levels of access control for group members in which group members are divided into a number of subgroups and placed at ditTerent privilege levels based on certain criteria and a member at higher level must be capable of accessing communication in its own level as well as its descendant lower levels and converse is not true. Two key management schemes have been developed to provide hierarchical access control: first method is key-based and the second one is share-based. Constrocting a hierarchical group communication model based on secret shares is more flexible rather than using keys. this paper we use share-based key management scheme and propose to reduce the storage at higher level users as compared to the scheme proposed by Dexter et al. by reusing a part of the pre-positioned information as common for all the layers in the system. We compare the storage and encryption cost of our scheme with the scheme proposed by Dexter et al. We also address periodic group rekeying.