Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1487
Title: New Method to Compute Auxiliary keys in LKH based Secure Group Key Management Scheme
Authors: Aparna, R
Amberker, B.B
Keywords: Compute Auxiliary
Management Scheme
Issue Date: 2008
Publisher: Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008
Citation: 10.1109/ADCOM.2008.4760426
Abstract: With the growth of internet, many network applications are relied on group communication model. To provide confidentiality for the communication between group members ,a secret key called group key is used. Since the group is dynamic, whenever there is a membership change (join/leave), group key is changed (rekeying) to provide forward and backward confidentiality. The hierarchical key-tree approach is widely used to achieve logarithmic costs for changing the key. Along with group key, key-tree also comprises of other set of keys called auxiliary keys which must also be changed as a part of rekeying. Key-tree based schemes involve a trusted entity called key server which performs rekeying operations. The load on the key server is increased with the increase in membership change (specifically with leave event). In this paper, we propose a scheme to reduce the load on the key server from O(mlogmn) to O(m) for a group of n users with the degree of the tree being m. The paper also addresses handling membership changes at regular intervals called batch rekeying, which reduces the rekeying complexity.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/1487
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
New_Method_to_Compute_Auxiliary_keys_in_LKH_based_Secure_Group_Key_Management_Scheme.pdf152.37 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.