A variety of rooted tree-based secure multicast networks with different efficiencies and storage requirements that are linear in group size have been proposed. Recently, Canetti et. al. presented a scheme based on clustering that had sub-linear storage requirements at the group controller. However, they were unable to prove or disprove that the scheme was optimal, and posed it as an open question. In this paper we answer the question with affirmative NO! Additionally we use our results to show that the optimal clustering in this context is related to maximum entropy of member revocation event, and corresponding optimal strategy is to partition members such that each cluster has the same probability of being revoked.Second Workshop on Securi...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
Recent literature presents several rooted tree based member deletion/ revocation schemes trying to s...
Recent literature presents several rooted tree based member deletion/revocation schemes trying to si...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
. We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center...
Several variations of rooted tree based solutions have been recently proposed for member revocation ...
[[abstract]]Recently, many group communication services have become the focus for future development...
In Eurocrypt'99, Canetti, Malkin, and Nissim [1], presented a new tree based key distribution algo...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
This dissertation considers the single sender, multiple receiver model of secure multicast communica...
Developing cryptographic key management protocols that have scalability in terms of the key storage...
Developing scalable infrastructure services for secure multicast communications has been an active r...
We introduce spatial clustering of multicast group members as a mechanism to scale wide-area multica...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...
Recent literature presents several rooted tree based member deletion/ revocation schemes trying to s...
Recent literature presents several rooted tree based member deletion/revocation schemes trying to si...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
. We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center...
Several variations of rooted tree based solutions have been recently proposed for member revocation ...
[[abstract]]Recently, many group communication services have become the focus for future development...
In Eurocrypt'99, Canetti, Malkin, and Nissim [1], presented a new tree based key distribution algo...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
This dissertation considers the single sender, multiple receiver model of secure multicast communica...
Developing cryptographic key management protocols that have scalability in terms of the key storage...
Developing scalable infrastructure services for secure multicast communications has been an active r...
We introduce spatial clustering of multicast group members as a mechanism to scale wide-area multica...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
This paper brings up a new concern regarding efficient re-keying of large groups with dynamic member...