. We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of different scenarios using multicast, presenting a wide range of efficiency requirements with respect to several parameters. We give an upper bound on the tradeoff between storage and communication parameters. In particular, we suggest an improvement of the schemes by Wallner et al. and Wong et al. [13, 14] with sub-linear center storage, without a significant loss in other parameters. Correctly selecting the parameters of our scheme we can efficiently accommodate a wide range of scenarios. This is demonstrated by Applying the protocol to some known benchmark scenarios. We also show lower bounds on the tradeoff between ...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
Developing scalable infrastructure services for secure multicast communications has been an active r...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
In Eurocrypt'99, Canetti, Malkin, and Nissim [1], presented a new tree based key distribution algo...
In secure group communications, there are both rekey and data traffic. We propose to use application...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
Abstract—Efficient key distribution is an important problem for secure group communications. The com...
This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. Th...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
Developing scalable infrastructure services for secure multicast communications has been an active r...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
In Eurocrypt'99, Canetti, Malkin, and Nissim [1], presented a new tree based key distribution algo...
In secure group communications, there are both rekey and data traffic. We propose to use application...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
Abstract—Efficient key distribution is an important problem for secure group communications. The com...
This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. Th...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...