Recent literature presents several rooted tree based member deletion/revocation schemes trying to simultaneously minimize the key storage whileproviding efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed. In this paper, we show that these problems can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event plays a major role in defining the key allocation requirements. We then relate the entropy of member revocation event to bounds on the key length. We also show that the optimal Huffman coding strategy used in leads to security weaknesses. A ...
The Internet today provides no support for privacy or authentication of multicast packets. However, ...
Self-healing key distribution schemes allow group managers to broadcast session keys to large and dy...
A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to e...
Recent literature presents several rooted tree based member deletion/ revocation schemes trying to s...
Several variations of rooted tree based solutions have been recently proposed for member revocation ...
This dissertation considers the single sender, multiple receiver model of secure multicast communica...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
AbstractMulticast and broadcast are efficient ways to deliver messages to a group of recipients in a...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
This paper proposes a "Minimum Redundancy Tree" (MRT) for key distribution in secure multicast. The ...
[[abstract]]This paper presents both the theoretical and practical aspects of secure group communica...
Developing scalable infrastructure services for secure multicast communications has been an active r...
AbstractThis paper presents both the theoretical and practical aspects of secure group communication...
This paper presents group key distribution techniques for large and dynamic groups over unreliable ...
We present the issues related to secure muiticast communication in the presence of members who may c...
The Internet today provides no support for privacy or authentication of multicast packets. However, ...
Self-healing key distribution schemes allow group managers to broadcast session keys to large and dy...
A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to e...
Recent literature presents several rooted tree based member deletion/ revocation schemes trying to s...
Several variations of rooted tree based solutions have been recently proposed for member revocation ...
This dissertation considers the single sender, multiple receiver model of secure multicast communica...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
AbstractMulticast and broadcast are efficient ways to deliver messages to a group of recipients in a...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
This paper proposes a "Minimum Redundancy Tree" (MRT) for key distribution in secure multicast. The ...
[[abstract]]This paper presents both the theoretical and practical aspects of secure group communica...
Developing scalable infrastructure services for secure multicast communications has been an active r...
AbstractThis paper presents both the theoretical and practical aspects of secure group communication...
This paper presents group key distribution techniques for large and dynamic groups over unreliable ...
We present the issues related to secure muiticast communication in the presence of members who may c...
The Internet today provides no support for privacy or authentication of multicast packets. However, ...
Self-healing key distribution schemes allow group managers to broadcast session keys to large and dy...
A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to e...