نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

2013
Saravana Kumar

Key management plays a very important role in the data communications. CBCEGKM is a key management scheme that provides more efficient and secure methods for key generation and utilization. This papers deals with the analysis of CBCEGKM with respect to communication overhead, computation cost, etc. The analysis shows that CBCEGKM comprises of the most reliable methods for key generations and he...

2004
Xukai Zou Byrav Ramamurthy

Many group key agreement protocols (GKA) for secure group communication (SGC) based on the Diffie-Hellman key exchange principle have been proposed in literature. All of these protocols require member serialization and/or existence of a central entity. In this paper, we propose a simple group Diffie-Hellman key agreement protocol which removes these two limitations. Moreover, the new protocol n...

Journal: :Int. Journal of Network Management 2004
Fu-Yuan Lee Shiuh-Pyng Shieh

Securing group communications in dynamic and large-scale groups is more complex than securing one-to-one communications due to the inherent scalability issue of group key management. In particular, cost for key establishment and key renewing is usually relevant to the group size and subsequently becomes a performance bottleneck in achieving scalability. To address this problem, this paper propo...

2012
E. MOHANRAJ

QoS is the presentation level of service presented by a network to the user. The objective of QoS is to accomplish more deterministic system activities so that the information conceded by the network can be better conveyed and the resources can be better employed. QoS routing and security is the process of offering continuous free paths to guarantee the required QoS parameters. The security of ...

2004
Junghyun Nam Seungjoo Kim Dongho Won

In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme does not meet the main security properties: implicit key authentication, forward secrecy, and known key security. Also, we propose an improved version which fixes the security flaws found in the scheme.

2005
Fuwen Liu Hartmut König

Many emerging interactive and collaborative applications use the peer-to-peer paradigm nowadays. In every-day life peer-to-peer meetings of small groups are dominant, e.g. for business talks. Confidentiality is of primary concern in this context to provide group privacy. To assure confidentiality the partners have to agree upon a secret group key for encrypting their communication. This require...

Journal: :I. J. Network Security 2014
Mohammad Sabzinejad Farash Mahmoud Ahmadian-Attari

In 2012, Piao et al. proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, we point out that there are some security weaknesses of Piao et al.’s intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members’ secret keys shared with the controller. In addition, their schem...

2003
Donggang Liu Peng Ning

This paper presents group key distribution techniques for highly mobile, volatile and hostile wireless networks in tactical situations (e.g., anti-terrorist operations, battle fields). The techniques proposed here are based on the self-healing key distribution methods (with revocation capability) recently developed by Staddon et al. [37]. By introducing a novel personal key distribution techniq...

2013
Ruxandra F. Olimid

Group key transfer protocols allow multiple parties to share a common secret key. They rely on a mutually trusted key generation center (KGC) that selects the key and securely distributes it to the authorized participants. Recently, Sun et al. proposed an authenticated group key transfer protocol based on secret sharing that they claim to be secure. We show that this is false: the protocol is s...

Journal: :IACR Cryptology ePrint Archive 2004
Junghyun Nam Seungjoo Kim Dongho Won

In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval’s group key agreement scheme does not meet the main security properties: implicit key authentication, forward secrecy, and known key security. Also, we propose an improved version which fixes the security flaws found in the scheme.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید