DLPKH - Distributed Logical Public-Key Hierarchy

نویسندگان

  • Rakesh Bobba
  • Himanshu Khurana
چکیده

Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the generating entity. In this work we develop a novel decentralized key distribution that uses public-key trees to eliminate the overheads of establishing secure channels and employs a practical approach of partial contribution to minimize the possibility of weak keys. The result is a simple and secure scheme whose performance is significantly better than previous schemes that involve contribution or distribution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reliable Key Authentication Schema for Secure Multicast Communications

This paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attac...

متن کامل

A scalable and distributed multicast security protocol using a subgroup-key hierarchy

In the present paper, a scalable protocol for securing multicast communication is proposed. The proposed protocol is based on the idea of dividing the whole group into smaller subgroups as in the Iolus protocol. For a member join or leave, the decomposition of the group into smaller subgroups will reduce the computation complexity from O(M), where M is the number of the whole group members, to ...

متن کامل

Efficient and Scalable Hierarchical Key Assignment Scheme

The access privileges in distributed systems are often organized as a hierarchy structure. Chien and Jan proposed an efficient hierarchical key assignment scheme without using the public key cryptosystem in 2003. Nevertheless, their scheme must use the smart card and the information published on the public board contains the essential secrets of the server and the corresponding users. We theref...

متن کامل

Efficient Provably-Secure Hierarchical Key Assignment Schemes

A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provablysecure and su...

متن کامل

Selecting Hospital\'s Key Performance Indicators, Using Analytic Hierarchy Process Technique

Introduction: hospitals performance indicators will help monitoring, evaluation and decision making and therefore must be selected and ranked accurately. The aim of present study is identifying and selecting key hospitals performance indicators. Materials and methods: This is a descriptive and mixed (quantitative-qualitative) study. literature review and expert panel has been done to identif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007