Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1487
Title: | New Method to Compute Auxiliary keys in LKH based Secure Group Key Management Scheme |
Authors: | Aparna, R Amberker, B.B |
Keywords: | Compute Auxiliary Management Scheme |
Issue Date: | 2008 |
Publisher: | Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008 |
Citation: | 10.1109/ADCOM.2008.4760426 |
Abstract: | With the growth of internet, many network applications are relied on group communication model. To provide confidentiality for the communication between group members ,a secret key called group key is used. Since the group is dynamic, whenever there is a membership change (join/leave), group key is changed (rekeying) to provide forward and backward confidentiality. The hierarchical key-tree approach is widely used to achieve logarithmic costs for changing the key. Along with group key, key-tree also comprises of other set of keys called auxiliary keys which must also be changed as a part of rekeying. Key-tree based schemes involve a trusted entity called key server which performs rekeying operations. The load on the key server is increased with the increase in membership change (specifically with leave event). In this paper, we propose a scheme to reduce the load on the key server from O(mlogmn) to O(m) for a group of n users with the degree of the tree being m. The paper also addresses handling membership changes at regular intervals called batch rekeying, which reduces the rekeying complexity. |
Description: | NITW |
URI: | http://localhost:8080/xmlui/handle/123456789/1487 |
Appears in Collections: | Computer Science & Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
New_Method_to_Compute_Auxiliary_keys_in_LKH_based_Secure_Group_Key_Management_Scheme.pdf | 152.37 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.