Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1487
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAparna, R-
dc.contributor.authorAmberker, B.B-
dc.date.accessioned2024-11-13T09:08:44Z-
dc.date.available2024-11-13T09:08:44Z-
dc.date.issued2008-
dc.identifier.citation10.1109/ADCOM.2008.4760426en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1487-
dc.descriptionNITWen_US
dc.description.abstractWith the growth of internet, many network applications are relied on group communication model. To provide confidentiality for the communication between group members ,a secret key called group key is used. Since the group is dynamic, whenever there is a membership change (join/leave), group key is changed (rekeying) to provide forward and backward confidentiality. The hierarchical key-tree approach is widely used to achieve logarithmic costs for changing the key. Along with group key, key-tree also comprises of other set of keys called auxiliary keys which must also be changed as a part of rekeying. Key-tree based schemes involve a trusted entity called key server which performs rekeying operations. The load on the key server is increased with the increase in membership change (specifically with leave event). In this paper, we propose a scheme to reduce the load on the key server from O(mlogmn) to O(m) for a group of n users with the degree of the tree being m. The paper also addresses handling membership changes at regular intervals called batch rekeying, which reduces the rekeying complexity.en_US
dc.language.isoenen_US
dc.publisherProceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008en_US
dc.subjectCompute Auxiliaryen_US
dc.subjectManagement Schemeen_US
dc.titleNew Method to Compute Auxiliary keys in LKH based Secure Group Key Management Schemeen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
New_Method_to_Compute_Auxiliary_keys_in_LKH_based_Secure_Group_Key_Management_Scheme.pdf152.37 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.