نتایج جستجو برای: group key

تعداد نتایج: 1484350  

Journal: :Pervasive and Mobile Computing 2007
Daniel Augot Raghav Bhaskar Valérie Issarny Daniele Sacchetti

Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one’s contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal secu...

2009
Yanjiang Yang Jianying Zhou Robert H. Deng Feng Bao

Self-healing group key distribution aims to achieve robust key distribution over lossy channels in wireless sensor networks (WSNs). However, all existing self-healing group key distribution schemes in the literature consider homogenous WSNs which are known to be unscalable. Heterogeneous WSNs have better scalability and performance than homogenous ones. We are thus motivated to study hierarchia...

2012
Wei Yuan Liang Hu Hongtu Li Jianfeng Chu

In this paper, a novel and efficent password based group key exchange protocol with secret sharing is proposed. Secret sharing technology is usually used to control the privileges of the authorized users to improve the robustness of the system in past years. The results are applied into designing the key exchange protocol directly, which clarify the proposed scheme. The security analysis shows ...

2012
Kashi Neupane Rainer Steinwandt Adriana Suárez Corona

The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform unauthenticated group key establishment protocols into authenticated ones. In this paper we present a modification of Katz and Yung’s construction which maintains the round complexity of their compiler, but for ‘typical’ unauthenticated group key establishments adds authentication in such a way that deniability is achieved...

Journal: :IJSN 2009
Bing Wu Jie Wu Yuhong Dong

Group key management is one of the basic building blocks in collaborative and group-orientedapplications inMobileAdHocNetworks (MANETs).Groupkey establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security.Modification ofmembership requires the groupkey to ...

Journal: :Journal of Computer Security 2006
Olivier Pereira Jean-Jacques Quisquater

The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Even though the corresponding attacks (or some variants of them) have been rediscovered in several different frameworks, no fixed version of these protocols has been proposed until now. In this paper, we prove that it is in fact impossible to design a scalable authenticated group key agreement prot...

2005
Ersin Uzun

In this paper, we give a brief overview of several recent proposals that address the problem of group key distribution in secure multicasting over mobile ad hoc networks. We discuss the requirements and challenges raised from multicast in ad hoc networks in general and group key distribution over mobile ad hoc networks in particular. We also give the analysis of each proposal in terms of effici...

2017
Nikita Gupta Amit Saxena Maithili Narasimha Randy Katz Lifeng Lai Siu-Wai Ho

Here in this paper a new and efficient technique for the Cohort of Keys using Tree based Algorithm is proposed for the Sharing of Data in Secure manner. The Key Group Procedure is implemented for the Sharing of Data where Data Owner who needs to send Data is first Encrypted Information using Tree grounded Key Group and then when Data is received at the other end it is decrypted and Classify as ...

2001
Huaxiong Wang

Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient g...

2005
Qiang Tang Chris J. Mitchell

In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was gen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید