نتایج جستجو برای: distribution key

تعداد نتایج: 1126998  

Journal: :IACR Cryptology ePrint Archive 2002
Régis Dupont Andreas Enge

2009
Ting Yuan Jianqing Ma Yiping Zhong Shiyong Zhang

The most common solution for implementing access control into a dynamic group is to use a group key unknown to all but the users in the group. The group key (i.e., session key) is updated for every session throughout the lifetime of the group with the procedure of group key distribution. In this paper, we propose a group key distribution scheme with self-healing property that enables users in a...

Journal: :CoRR 2009
Eric Ke Wang Lucas Chi Kwong Hui Siu-Ming Yiu

Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...

1997
Woei-Jiunn Tsaur Shi-Jinn Horng Shung-Shing Lee Ruey-Chang Tsai

Based on a geometric meth.od, this paper presents an eficient a,nd authenticated cryptoscheme for establishing secure group-oriented data communications in internet environments. We assume that the internet environments consist of many hosts, and each host has many users attached to it. The secure group-oriented communication scheme proposed in this paper incorporates the public-key distributio...

2005
Ruidong Li Jie Li Hisao Kameda

Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications. In this paper, to efficiently and effectively achieve this goal, we propose a distributed key management scheme whereby each SG (Service Group) maintains an SG server. This server is utilized to ma...

Journal: :CIT 2009
R. Aparna B. B. Amberker

Secure Group Communication is very critical for applications like board-meetings, group discussions and teleconferencing. Managing a set of secure group keys and group dynamics are the fundamental building blocks for secure group communication systems. Several group key management techniques have been proposed so far by many researchers. Some schemes are information theoretic and some are compl...

2000

Secure group communication is an increasingly popular research area having received much attention in the last several years. The fundamental challenge revolves around secure and efficient group key management. While centralized methods are often appropriate for key distribution in large groups, many collaborative group settings require distributed key agreement techniques. This work investigat...

2005
Ashok Kumar Das Abhijit Das Surjyakanta Mohapatra Srihari Vavilapalli

In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment configuration by secure transmission of predistributed keys. This results in better connectivity than what path key establishment can yield. The communication overhead for our scheme is comparable with that for path key e...

Journal: :CoRR 2010
Anvesh Aileni

Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster are discussed. Also, inter and intra cluster communications...

1995
Kaoru KUROSAWA Koji OKADA Keiichi SAKANO

This paper studies the security of the trusted center in a b-secure t-group key distribution scheme in which the center issues a private information vi 2 V to each user i based on the center secret s 2 S. User i can obtain the common key k 2 K with t ? 1 other users from vi so that any dishonest b users cannot learn any key they should not know. First, we show how to distribute the power of the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید