메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1952-1960

Secure group key management using uni-directional proxy re-encryption schemes

Author keywords

Group key management; proxy re encryption

Indexed keywords

BROADCAST CHANNELS; COLLUSION ATTACK; COMPUTATION TIME; DYNAMIC GROUPS; GROUP KEY; GROUP KEY MANAGEMENT; GROUP MANAGERS; GROUP MEMBERS; MULTIHOP; OFFLINE; PRACTICAL SOLUTIONS; PROXY RE ENCRYPTIONS; RE-KEY MESSAGE; SPECIAL PROPERTIES;

EID: 79960886232     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934999     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 1
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 3
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 8
    • 34247877631 scopus 로고    scopus 로고
    • Secure multicast in dynamic environments
    • C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, and C.-L. Lei, "Secure multicast in dynamic environments," Computer Networks, vol. 51, no. 10, pp. 2805-2817, 2007.
    • (2007) Computer Networks , vol.51 , Issue.10 , pp. 2805-2817
    • Huang, C.-Y.1    Chiu, Y.-P.2    Chen, K.-T.3    Lei, C.-L.4
  • 12
    • 34250309913 scopus 로고    scopus 로고
    • Scalable solutions for secure group communications
    • R. Mukherjee and J. W. Atwood, "Scalable solutions for secure group communications," Computer Networks, vol. 51, no. 12, pp. 3525-3548, 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3525-3548
    • Mukherjee, R.1    Atwood, J.W.2
  • 16
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proceedings of EUROCRYPT, 1998, pp. 127- 144.
    • (1998) Proceedings of EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 20
    • 77957655174 scopus 로고    scopus 로고
    • Cca proxy re-encryption without bilinear maps in the standard model
    • T. Matsuda, R. Nishimaki, and K. Tanaka, "Cca proxy re-encryption without bilinear maps in the standard model," in Public Key Cryptography (PKC), 2010, pp. 261-278.
    • (2010) Public Key Cryptography (PKC) , pp. 261-278
    • Matsuda, T.1    Nishimaki, R.2    Tanaka, K.3
  • 22
    • 79960856522 scopus 로고    scopus 로고
    • N. I. o. S. U.S. Department of Commerce and Technology. [Online]
    • N. I. o. S. U.S. Department of Commerce and Technology, 2008. [Online]. Available: http://csrc.nist.gov/publications/fips/fips180-3/fips180-3final.pdf
    • (2008)
  • 23
    • 37549056155 scopus 로고    scopus 로고
    • Hierarchical group access control for secure multicast communications
    • Y. Sun and K. J. R. Liu, "Hierarchical group access control for secure multicast communications," IEEE/ACM Transactions on Networking, vol. 15, no. 6, pp. 1514-1526, 2007.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.6 , pp. 1514-1526
    • Sun, Y.1    Liu, K.J.R.2
  • 24
    • 33646870054 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of CRYPTO, 2005, pp. 258-275.
    • (2005) Proceedings of CRYPTO , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 26
    • 40249098618 scopus 로고    scopus 로고
    • Public key broadcast encryption with low number of keys and constant decryption time
    • Y.-R. Liu and W.-G. Tzeng, "Public key broadcast encryption with low number of keys and constant decryption time," in Proceedings of Public Key Cryptography (PKC), 2008, pp. 380-396.
    • (2008) Proceedings of Public Key Cryptography (PKC) , pp. 380-396
    • Liu, Y.-R.1    Tzeng, W.-G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.