Elements of information theory
Elements of information theory
On key distribution via true broadcasting
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Key Management for Secure Multicast with Dynamic Controller
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
Information Security Applications
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
IEEE Transactions on Wireless Communications
An authenticated self-healing key distribution scheme based on bilinear pairings
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
An Efficient and Secure Self-Healing Scheme for LKH
Journal of Network and Systems Management
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Collusion attack on a self-healing key distribution with revocation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Access polynomial based self-healing key distribution with improved security and performance
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Collusion resistant self-healing key distribution in mobile wireless networks
International Journal of Wireless and Mobile Computing
Designing scalable self-healing key distribution schemes with revocation capability
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
We propose a new method for distributing a common key to a dynamic group over an unreliable channel. In [15], an unconditionally secure "self-healing" protocol that solves this problem and has significant advantages over previous work in this area is presented. However, the protocol suffers from inconsistent robustness, high overhead and expensive maintenance costs. We propose a more practical self-healing protocol that attempts to address these three problems. First, we use a sliding window to make error recovery consistently robust. Second, we significantly reduce overhead. Finally, we give the group manager the ability to spread the cost of personal key distribution over multiple sessions, rather than having to distribute new personal keys to all users at the same time.