Key Agreement for Large-Scale Dynamic Peer Group
نویسندگان
چکیده
منابع مشابه
Key Agreement in Dynamic Peer Groups
ÐAs a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer teleand videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynam...
متن کاملDistributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from traditional secure group communication. They are (1) distributed nature in which there is no centralized key server, (2) collaborative nature in which the group key is contributory; i.e., each group member will collaborati...
متن کاملDistributed Collaborative Key Agreement Protocol for Dynamic Peer Groups
In recent years, group-oriented applications and collaborative protocols are gaining popularity. This calls for group key management which forms the basic building block in achieving secure group communication. The points that differentiate it from the traditional communication are that they do not have a centralized server but a distributed system, group key being contributory and dynamic natu...
متن کاملConstant Round Dynamic Group Key Agreement
We present a fully symmetric constant round authenticated group key agreement protocol in dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure under DDH assumption in the security model of Bresson et al. providing, we feel, better security guarantee than previously published results. The protocol is efficient in terms of both communication and computation power.
متن کاملA Key Agreement for Large Group Using Bilinear Maps
A key agreement scheme for large dynamic multicast group systems has been designed to cope with such applications including pay-tv, teleconferencing, collaborative work, online games, and so forth. To avoid heavy loads and unauthorized accesses to the system, it is necessary to construct an efficient and secure scheme. Some recently released schemes have tree-based underlying structures. The ef...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: GSTF INTERNATIONAL JOURNAL ON COMPUTING
سال: 2011
ISSN: 2010-2283
DOI: 10.5176/2010-2283_1.2.39