Zhang et al., 2003 - Google Patents
A novel dynamic key management scheme for secure multicastingZhang et al., 2003
View PDF- Document ID
- 4529351234427457305
- Author
- Zhang J
- Varadharajan V
- Mu Y
- Publication year
- Publication venue
- The 11th IEEE International Conference on Networks, 2003. ICON2003.
External Links
Snippet
We propose a new secure multicast scheme based on a novel hybrid key distribution scheme. This scheme meets the requirements described in the Internet Engineering Task Force (IETF) for multicast security architecture. It exhibits certain unique advantages in …
- 238000000034 method 0 description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Balenson et al. | Key management for large dynamic groups: One-way function trees and amortized initialization | |
| Hur et al. | Secure data retrieval for decentralized disruption-tolerant military networks | |
| Chan et al. | Key management approaches to offer data confidentiality for secure multicast | |
| Dondeti et al. | A dual encryption protocol for scalable secure multicasting | |
| Dondeti et al. | Scalable secure one-to-many group communication using dual encryption | |
| US7328343B2 (en) | Method and apparatus for hybrid group key management | |
| Choi et al. | Efficient secure group communications for SCADA | |
| Yu et al. | Attribute-based on-demand multicast group setup with membership anonymity | |
| Pande et al. | Survey on logical key hierarchy for secure group communication | |
| Mukherjee et al. | Scalable solutions for secure group communications | |
| Zhang et al. | A novel dynamic key management scheme for secure multicasting | |
| Zhou et al. | Decentralized group key management for hierarchical access control using multilinear forms | |
| Weiler | Semsomm-a scalable multiple encryption scheme for one-to-many multicast | |
| Tomar et al. | Secure Group Key Agreement with Node Authentication | |
| US20110255695A1 (en) | Key management method | |
| Hardjono et al. | Secure and scalable inter-domain group key management for N-to-N multicast | |
| Aparna et al. | Key management scheme for multiple simultaneous secure group communication | |
| Kurnio et al. | Efficient revocation schemes for secure multicast | |
| Thomas et al. | A novel decentralized group key management using attribute based encryption | |
| Mehdizadeh et al. | Secure group communication scheme in wireless IPv6 networks: An experimental test-bed | |
| Cimato et al. | A unified model for unconditionally secure key distribution | |
| Dondeti | Efficient private group communication over public networks | |
| Kurnio et al. | Key management for secure multicast with dynamic controller | |
| Zheng et al. | Scalable group key management protocol based on key material transmitting tree | |
| Chaddoud et al. | Efficient secure group management for SSM |