T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity

نویسندگان

  • Tetsuya Hatano
  • Atsuko Miyaji
  • Takashi Sato
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Scalable and Effective Architecture for Grid Services’ Discovery

This paper presents Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Services discovery based on VDHA has scalable, autonomous, efficient, reliable, quick responsive, and fully. We propose two service discovery algorithms. Full Search Query and Discovery Protocol (FSQDP) discovers the nodes that match the request message from all N nodes,...

متن کامل

A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity

Group key establishment is one of the basic building blocks in securing group communication. In this paper, motivated by Desmedt's BD-II protocol, we propose a secure ID-Based group key establishment protocol which has a constant number of rounds and requires only (log ) O n computation and communication. Our scheme achieves key negotiate by scalar multiplication other than using pairing comput...

متن کامل

Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force group for some project needs to be built. This order is passed down the hierarchy where it finally reaches a manager who calls some employees to form a group. The members should communicate in a secure way and for eff...

متن کامل

Design of RFID Security Authentication Protocol for E-Commerce Service

As for security of RFID network, this paper has proposed a safe, effective and scalable RFID Authentication Protocol (CRFID) with cloud database as server. Firstly, the tree-structure management tag is used to achieve privacy protection, and the time complexity of RFID system in search of cloud database is reduced from O (N) to O (logN); then, the size of each subkey in keys route of the RFID t...

متن کامل

Scalable Group Key Exchange for Securing Distributed Operating Systems

Distributed operating systems are designed to run over a collection of computing nodes that are spatially disseminated and communicate through a computer network. The computing nodes interact collaboratively with each other in order to pursue a common purpose. Protecting group communication between the collaborating nodes against potential attacks is one of the major challenges faced by the des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011