A COMPUTATIONALLY EFFICIENT KEY-HIDING BASED GROUP RE-KEYING SCHEME FOR SECURE MULTICASTING

Y.M. Asem and A. Kara

References

  1. [1] C.K. Wong, M. Gouda, & S.S. Lam, Secure group communi-cations using key graphs, IEEE/ACM Trans. on Networking,8 (1), 2000, 16–30. doi:10.1109/90.836475
  2. [2] I. Chang, R. Engel, D. Kandlur, D. Pendrakis, & D. Saha,Key management for secure Internet multicast using Booleanfunction minimization techniques, Proc. IEEE INFOCOM’99,2, New York, March 1999, 689–698.
  3. [3] D. Wallner, E. Harder, & R. Agee, Key management for multi-cast: Issues and architectures, RFC (Request For Comments)2627, June 1999.
  4. [4] D. Balenson, D.A. McGrew, & A.T. Sherman, Key establish-ment in large dynamic groups using one-way function treesand amortized initialization, Internet draft (Work in Progress,http://www.ietf.org/ID.html), 1999.
  5. [5] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, &B. Pinkas, Multicast security: A taxonomy and some efficientconstructions, Proc. INFOCOM’99, 1999, 708–716. doi:10.1109/INFCOM.1999.751457
  6. [6] S. Mittra, Iolus: A framework for scalable secure multicasting,Proc. ACM SIGCOMM’97, Canne, France, 1997, 277–288. doi:10.1145/263109.263179
  7. [7] G.-H. Chiou & W.-T. Chen, Secure broadcasting using thesecure lock, IEEE Trans. Software Engineering, 15, 1989,929–934. doi:10.1109/32.31350
  8. [8] M. Abdalla, Y. Shavitt, & A. Wool, Key management forrestricted multicast using broadcast encryption, IEEE/ACMTrans. Networking, 8 (4), 2000, 443–454. doi:10.1109/90.865073
  9. [9] M. Steiner, G. Tsudik, & M. Waidner, Key agreement indynamic peer groups, IEEE Trans. Parallel and DistributedSystems, 11 (8), 2000, 769–780. doi:10.1109/71.877936
  10. [10] Y.M. Asem & A. Kara, Combining secure lock with keygraph for efficient group rekeying. Proc. ICT2003, Bangkok,Thailand, April 2003, 235–239.
  11. [11] T. Hardjono & B. Weis, The multicast group security archi-tecture, RFC 3740, March 2004.
  12. [12] S. Kent & R. Atkinson, Security architecture for the Internetprotocol, RFC 2401, November 1998.
  13. [13] T. Dierks & C. Allen, The TLS protocol version 1.0, RFC2246, January 1999.
  14. [14] S. Setia, S. Koussih, & S. Jajodia, Kronos: A scalable groupre-keying approach for secure multicast, 2000 IEEE Symp. onSecurity and Privacy, Oakland, CA, May 2000, 215–229.72 doi:10.1109/SECPRI.2000.848459

Important Links:

Go Back