Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Secure Multicast Software Delivery
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A Secure Group Key Management Communication Lower Bound
A Secure Group Key Management Communication Lower Bound
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Information Processing Letters
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Information Processing Letters
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Hi-index | 0.00 |
Security and efficiency of rekeying are crucialrequirements for multicast key management. However,the two requirements pull in different directions andbalancing them to meet the application needs is still anopen issue. In this paper we introduce a Hybrid KeyTree scheme to balance security, namely the resistanceto collusion, and the efficiency. The resistance tocollusion is measured by an integer parameter. Thecommunication and the storage requirements for thecontroller depend on this parameter too, and theydecrease as the resistance to collusion is relaxed. Weanalytically evaluate the efficiency of our scheme andcompare with the previous work. The results show that ourscheme allows a fine-tuning of security requirements versusefficiency requirements at run-time, that is not possible withthe previous key management schemes.