Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Improving Internet multicast with routing labels
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Secure Group Communications Using Key Graphs
Secure Group Communications Using Key Graphs
Enclaves: enabling secure collaboration over the Internet
IEEE Journal on Selected Areas in Communications
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Secure group management in large distributed systems: what is a group and what does it do?
Proceedings of the 1999 workshop on New security paradigms
New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
A secure multicast protocol for the internet's multicast backbone
International Journal of Network Management
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Towards scalable and reliable group key management
Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
ACM Transactions on Information and System Security (TISSEC)
Secure and efficient key management for dynamic multicast groups
ACM SIGOPS Operating Systems Review
Authenticated multicast immune to denial-of-service attack
Proceedings of the 2002 ACM symposium on Applied computing
Secure key agreement for group communications
International Journal of Network Management
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Broadcast Encryption's Bright Future
Computer
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
A New Approach for Secure Multicast Routing in a Large Scale Network
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Efficient Revocation Schemes for Secure Multicast
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Dynamic Group Key Management Protocol
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
RP-Based Multicast Receiver Access Control in PIM-SM
NETWORKING '00 Proceedings of the IFIP-TC6 / European Commission International Conference on Broadband Communications, High Performance Networking, and Performance of Communication Networks
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
A Revocation Scheme with Minimal Storage at Receivers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
A Scalable Framework for Secure Group Communication
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Probabilistic Methods in Multicast Key Management
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Kerberized Multicast in a Practical Distributed Setting
ISC '01 Proceedings of the 4th International Conference on Information Security
Network security in the multicast framework
Advanced lectures on networking
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Router-Assistance for Receiver Access Control in PIM-SM
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Performance Optimizations for Group Key Management Schemes
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A Constant Size Rekeying Message Framework for Secure Multicasting
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
MobiCom poster: secure spaces: location-based secure wireless group communication
ACM SIGMOBILE Mobile Computing and Communications Review
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Broadcast encryption with short keys and transmissions
Proceedings of the 3rd ACM workshop on Digital rights management
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
A scalable key-management scheme with minimizing key storage for secure group communications
International Journal of Network Management
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
Journal of Systems and Software - Special issue: Performance modeling and analysis of computer systems and networks
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Proceedings of the 11th ACM conference on Computer and communications security
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Gossip-based scalable and reliable group key distribution framework
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
Designs, Codes and Cryptography
Graceful service degradation (or, how to know your payment is late)
Proceedings of the 6th ACM conference on Electronic commerce
Support for multi-level security policies in DRM architectures
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A group key recovery mechanism based on logical key hierarchy
Journal of Computer Security
Remote revocation of smart cards in a private DRM system
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Last hop topology sensitive multicasting key managment
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
IBM Systems Journal
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Antigone: a flexible framework for secure group communication
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient group key management for multi-privileged groups
Computer Communications
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
A Robust Reputation Scheme for Decentralized Group Management Systems
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
Securing network access in wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme
Designs, Codes and Cryptography
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
Approximation Algorithms for Key Management in Secure Multicast
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Transactions on Wireless Communications
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Broadcast Encryption-Based P2P DRM without Central License Server
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Efficient broadcast encryption with user profiles
Information Sciences: an International Journal
Mykil: a secure and highly available key management system for large group multicast
International Journal of Computers and Applications
An efficient revocation scheme with minimal message length for stateless receivers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secure source specific multicast for networks including mobile hosts
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A group key management supporting individual batch rekeying and fault tolerance for secure multicast
ICCS'03 Proceedings of the 2003 international conference on Computational science: PartIII
Efficient re-keying protocols for multicast encryption
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Scalable authenticated tree based group key exchange for ad-hoc groups
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Attribute-based broadcast encryption scheme made efficient
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Chosen ciphertext secure authenticated group communication using identity-based signcryption
Computers & Mathematics with Applications
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
Proceedings of the tenth annual ACM workshop on Digital rights management
Efficient multi-dimensional key management in broadcast services
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Adaptive multicast key management for tactical networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Pyramid group key management on mobile ad hoc networks PGKM
ELECTRO'10 Proceedings of the 8th WSEAS international conference on Applied electromagnetics, wireless and optical communications
On the effects of pirate evolution on the design of digital content distribution systems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Key management for secure multicast using the ringnet hierarchy
CIS'04 Proceedings of the First international conference on Computational and Information Science
Secure group communication with low communication complexity
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Secure group communication in grid computing
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Performance analysis of batch rekey algorithm for secure group communications
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A tree based one-key broadcast encryption scheme with low computational overhead
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Improvement of the naive group key distribution approach for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Secure group communications over combined wired and wireless networks
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Building a secure and highly scalable data distribution system
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Efficient security mechanisms for overlay multicast-based content distribution
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Secure multicast in micro-mobility environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
One-Way chain based broadcast encryption schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficient broadcast encryption using multiple interpolation methods
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Network access control for mobile ad-hoc networks
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Anonymous distribution of encryption keys in cellular broadcast systems
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Efficient broadcast encryption scheme with log-key storage
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Fast algorithms for the free riders problem in broadcast encryption
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
An extension of secure group communication using key graph
Information Sciences: an International Journal
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Privacy enhanced data outsourcing in the cloud
Journal of Network and Computer Applications
Scalable secure one-to-many group communication using dual encryption
Computer Communications
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Authenticity check to provide trusted platform in MANET (ACTP)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Spoilt for choice: graph-based assessment of key management protocols to share encrypted data
Proceedings of the 4th ACM conference on Data and application security and privacy
On the mean number of encryptions for tree-based broadcast encryption schemes
Journal of Discrete Algorithms
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.01 |
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue.In this paper, we present a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U,K,R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave, and specify protocols for joining and leaving a secure group. The rekeying strategies and join/leave protocols are implemented in a prototype group key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.