نتایج جستجو برای: group key

تعداد نتایج: 1484350  

Journal: :I. J. Network Security 2016
Zheng Yang Daigu Zhang

We propose two security models for one-round group key exchange (ORGKE), which are called as g-eCKw and g-eCK-PFS. The g-eCK-PFS is a stronger variant of geCKw, which particularly formulates perfect forward secrecy for ORGKE. A new tripartite ORGKE is proposed to provide g-eCKw security without random oracles under standard assumptions, that is also more efficient than its predecessor by Li and...

Journal: :JCIT 2010
Xianping Wu Huy Hoang Ngo Phu Dung Le Bala Srinivasan Huamei Qi

This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...

2008
Zhiguo Wan Kui Ren Wenjing Lou Bart Preneel

Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID-based cryptosystem have been proposed for this objective. Though bearing beneficial features like reduced management cost, private key delegation from ID-based cryptosystem, they have not taken into account privacy issu...

Journal: :CoRR 2012
Elina Eidkhani Melisa Hajyvahabzadeh S. Anahita Mortazavi Alireza Nemaney Pour

Recently, the number of requests for multicast services through the wireless networks has been increased. However, for successful deployment, security and efficiency of content delivery must be provided at first. This paper presents a new approach for secure multicast in wireless networks. This approach, CRAW (Combination of Re-keying and Authentication in Wireless networks) combines member aut...

Journal: :Comput. Sci. Inf. Syst. 2014
Inshil Doh Jiyoung Lim Shi Li Kijoon Chae

In the ubiquitous environment, more and more devices are deployed in our daily life, and need to communicate with one another. M2M (Machine-toMachine) communication is considered to be one of the major issues in future networks. M2M is expected to bring various benefits in wireless communications when it is interconnected with cellular networks. Considering the characteristics of cellular M2M n...

Journal: :IACR Cryptology ePrint Archive 2011
Shaohua Tang Jintai Ding Yujun Liang

A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in the group corresponds to a vector in the vector space and the GC computes a central vector, whose inner product with every member’s ID vector are identical. The central vector is published and each...

2005
Sencun Zhu Sushil Jajodia

Multicast is an efficient technique to distribute data to a large group of users. To prevent disclosure of distributed data to unauthorized users, multicast-based applications require confidential group communication, which is achieved by encrypting data with a group-wide shared key. The group key must be updated and redistributed to all authorized users in a secure and reliable fashion wheneve...

Journal: :J. Inf. Sci. Eng. 2006
Ganapathi Padmavathi Samukutty Annadurai

Multicast communication will be the communication paradigm of future networks. Secure multicasting is a challenging issue. The main objective of secure multicasting is to distribute the group key to the current members of the group in a scalable manner with minimum overheads. The key distribution methods can be either centralized or distributed. Of these, the centralized methods are simple and ...

Journal: :TIIS 2017
Mu Han Lei Hua Shidian Ma

With the rapid development of vehicular ad hoc Network (VANET), it is gaining significant popularity and receiving increasing attentions from academics and industry in security and efficiency. To address security and efficiency issues, a selfauthentication and deniable efficient group key agreement protocol is proposed in this paper. This scheme establishes a group between road-side unit (RSU) ...

Journal: :RFC 1996
Tony Ballardie

groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a \working draft" or \work in progress." Abstract Multicasting is becoming an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید