[go: up one dir, main page]

Zhang et al., 2003 - Google Patents

A novel dynamic key management scheme for secure multicasting

Zhang et al., 2003

View PDF
Document ID
4529351234427457305
Author
Zhang J
Varadharajan V
Mu Y
Publication year
Publication venue
The 11th IEEE International Conference on Networks, 2003. ICON2003.

External Links

Snippet

We propose a new secure multicast scheme based on a novel hybrid key distribution scheme. This scheme meets the requirements described in the Internet Engineering Task Force (IETF) for multicast security architecture. It exhibits certain unique advantages in …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure

Similar Documents

Publication Publication Date Title
Balenson et al. Key management for large dynamic groups: One-way function trees and amortized initialization
Hur et al. Secure data retrieval for decentralized disruption-tolerant military networks
Chan et al. Key management approaches to offer data confidentiality for secure multicast
Dondeti et al. A dual encryption protocol for scalable secure multicasting
Dondeti et al. Scalable secure one-to-many group communication using dual encryption
US7328343B2 (en) Method and apparatus for hybrid group key management
Choi et al. Efficient secure group communications for SCADA
Yu et al. Attribute-based on-demand multicast group setup with membership anonymity
Pande et al. Survey on logical key hierarchy for secure group communication
Mukherjee et al. Scalable solutions for secure group communications
Zhang et al. A novel dynamic key management scheme for secure multicasting
Zhou et al. Decentralized group key management for hierarchical access control using multilinear forms
Weiler Semsomm-a scalable multiple encryption scheme for one-to-many multicast
Tomar et al. Secure Group Key Agreement with Node Authentication
US20110255695A1 (en) Key management method
Hardjono et al. Secure and scalable inter-domain group key management for N-to-N multicast
Aparna et al. Key management scheme for multiple simultaneous secure group communication
Kurnio et al. Efficient revocation schemes for secure multicast
Thomas et al. A novel decentralized group key management using attribute based encryption
Mehdizadeh et al. Secure group communication scheme in wireless IPv6 networks: An experimental test-bed
Cimato et al. A unified model for unconditionally secure key distribution
Dondeti Efficient private group communication over public networks
Kurnio et al. Key management for secure multicast with dynamic controller
Zheng et al. Scalable group key management protocol based on key material transmitting tree
Chaddoud et al. Efficient secure group management for SSM