This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. The method is centralized, secure, efficient, scalable to a reasonable size and compatible with any multicast topology configuration underneath. It can be used to achieve privacy in a centralized multicast overlay. Additionally, the method can be used to renew an asymmetric key pair when a cryptosystem based on discrete logarithm is used. Knowl-edge of the public key is then restricted to the group it is communicated to. Security and scalability are discussed, and a comparison with other well-known alternatives is shown
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
With the advent of digital technologies and widening Internet bandwidth in recent years there has be...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Multicast is an efficient way to distribute data to multiple receivers simultaneously. However, secu...
A large number of applications like multi-player games, video conferencing, chat groups and network ...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
Proposals for multicast security that have been published so far are complex, often require trust in...
Proposals for multicast security that have been published so far are complex, often require trust in...
[[abstract]]Secure multicasting allows the sender to deliver an identical secret to an arbitrary set...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Middleware supporting secure applications in a distributed environment faces several challenges. Sca...
Middleware supporting secure applications in a distributed environment faces several challenges. Sca...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
With the advent of digital technologies and widening Internet bandwidth in recent years there has be...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Multicast is an efficient way to distribute data to multiple receivers simultaneously. However, secu...
A large number of applications like multi-player games, video conferencing, chat groups and network ...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
Proposals for multicast security that have been published so far are complex, often require trust in...
Proposals for multicast security that have been published so far are complex, often require trust in...
[[abstract]]Secure multicasting allows the sender to deliver an identical secret to an arbitrary set...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Middleware supporting secure applications in a distributed environment faces several challenges. Sca...
Middleware supporting secure applications in a distributed environment faces several challenges. Sca...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...