Building adaptive systems using ensemble
Software—Practice & Experience - Special issue on multiprocessor operating systems
ACM Transactions on Computer Systems (TOCS)
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
ACM Transactions on Information and System Security (TISSEC)
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Efficient Security for Large and Dynamic Multicast Groups
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Performance Optimizations for Group Key Management Schemes
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Hi-index | 0.00 |
Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed and of these the most efficient and scalable ones are based on logical key hierarchies (LKH) with symmetric keys organized in a tree. However, these solutions centralize trust in the group controller and make it an attractive attack target for access to communication keys for all groups supported by the controller. In this paper we propose a novel group key management approach, which uses a partially trusted controller that does not have access to communication keys and yet provides the same level of efficiency and scalability as LKH schemes. For this we develop a new public-key encryption scheme, which is based on El Gamal, and we show that the scheme is as secure as El Gamal.