A secure audio teleconference system
CRYPTO '88 Proceedings on Advances in cryptology
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Specifying and using a partitionable group communication service
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Communication-Efficient Group Key Agreement
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Using hash functions as a hedge against chosen ciphertext attack
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Tree-based group key agreement framework for mobile ad-hoc networks
Future Generation Computer Systems
Information Sciences: an International Journal
Robust group key agreement using short broadcasts
Proceedings of the 14th ACM conference on Computer and communications security
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Ternary Tree Based Group Key Management in Dynamic Peer Networks
Computational Intelligence and Security
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Information Security and Cryptology --- ICISC 2008
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Design of efficient ternary-tree based group key agreement protocol for dynamic groups
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
An efficient fault-tolerant group key agreement protocol
Computer Communications
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
T-robust scalable group key exchange protocol with O(log n) complexity
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Security-Effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 14.98 |
In recent years, collaborative and group-oriented applications and protocols have gained popularity. These applications typically involve communication over open networks; security thus is naturally an important requirement. Group key management is one of the basic building blocks in securing group communication. Most prior research in group key management focused on minimizing computation overhead, in particular minimizing expensive cryptographic operations. However, continued advances in computing power have not been matched by a decrease in network communication delay. Thus, communication latency, especially in high-delay long-haul networks, increasingly dominates the key setup latency, replacing computation delay as the main latency contributor. Hence, there is a need to minimize the size of messages and, especially, the number of rounds in cryptographic protocols. Since most previously proposed group key management techniques optimize computational (cryptographic) overhead, they are particularly impacted by high communication delay. In this work, we discuss and analyze a specific group key agreement technique which supports dynamic group membership and handles network failures, such as group partitions and merges. This technique is very communication-efficient and provably secure against hostile eavesdroppers as well as various other attacks specific to group settings. Furthermore, it is simple, fault-tolerant, and well-suited for high-delay networks.