EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Efficient Security for Large and Dynamic Multicast Groups
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
A Low Latency, Loss Tolerant Architecture and Protocol for Wide Area Group Communication
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure Group Communications Using Key Graphs
Secure Group Communications Using Key Graphs
A combinatorial study of communication, storage and traceability in broadcast encryption systems
A combinatorial study of communication, storage and traceability in broadcast encryption systems
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient State Updates for Key Management
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Probabilistic Methods in Multicast Key Management
ISW '00 Proceedings of the Third International Workshop on Information Security
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Information Processing Letters
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A scalable key management and clustering scheme for ad hoc networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Information Sciences: an International Journal
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
An group key distribution protocol for secure group communications
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
A tree-based scheme for security of many-to-many communications
Journal of High Speed Networks - Broadband Multimedia Sensor Networks in Healthcare Applications
A scalable key management and clustering scheme for wireless ad hoc and sensor networks
Future Generation Computer Systems
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
A Robust Reputation Scheme for Decentralized Group Management Systems
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Key hierarchies for hierarchical access control in secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
GeoSENS: geo-based sensor network secure communication protocol
Computer Communications
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Information Processing Letters
Wireless broadcast encryption based on smart cards
Wireless Networks
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Secure group communication using binomial trees
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
An Efficient and Secure Self-Healing Scheme for LKH
Journal of Network and Systems Management
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
Knowledge transformation and decision support systems
MAMECTIS'10 Proceedings of the 12th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Study on context understanding, knowledge transformation and decision support systems
WSEAS Transactions on Information Science and Applications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Adaptive multicast key management for tactical networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Threshold public-key encryption with adaptive security and short ciphertexts
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Secure group key distribution protocol for distributed systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
Knowledge management improvement using GIS
MCBANTA'11 Proceedings of the 12th WSEAS international conference on Mathematics and computers in biology, business and acoustics
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Fully distributed broadcast encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Accusation resolution using security metrology
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Poster: attribute based broadcast encryption with permanent revocation
Proceedings of the 18th ACM conference on Computer and communications security
A new group rekeying method in secure multicast
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Limits of the cryptographic realization of dolev-yao-style XOR
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Journal of Computational and Applied Mathematics
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
A new authenticated group key transfer protocol for actual network environment
International Journal of Ad Hoc and Ubiquitous Computing
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks
Wireless Personal Communications: An International Journal
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.01 |
We present, implement, and analyze a new scalable centralized algorithm, called OFT, for establishing shared cryptographic keys in large, dynamically changing groups. Our algorithm is based on a novel application of one-way function trees. In comparison with the top-down logical key hierarchy (LKH) method of Wallner et al., our bottom-up algorithm approximately halves the number of bits that need to be broadcast to members in order to rekey after a member is added or evicted. The number of keys stored by group members, the number of keys broadcast to the group when new members are added or evicted, and the computational efforts of group members, are logarithmic in the number of group members. Among the hierarchical methods, OFT is the first to achieve an approximate halving in broadcast length, an idea on which subsequent algorithms have built. Our algorithm provides complete forward and backward security: Newly admitted group members cannot read previous messages, and evicted members cannot read future messages, even with collusion by arbitrarily many evicted members. In addition, and unlike LKH, our algorithm has the option of being member contributory in that members can be allowed to contribute entropy to the group key. Running on a Pentium II, our prototype has handled groups with up to 10 million members. This algorithm offers a new scalable method for establishing group session keys for secure large-group applications such as broadcast encryption, electronic conferences, multicast sessions, and military command and control.