Scalable and efficient approach for secure group communication using proxy cryptography

Cited 6 time in webofscience Cited 0 time in scopus
  • Hit : 418
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorShin, Youngjooko
dc.contributor.authorHur, Junbeomko
dc.date.accessioned2013-03-12T01:54:45Z-
dc.date.available2013-03-12T01:54:45Z-
dc.date.created2012-05-29-
dc.date.created2012-05-29-
dc.date.issued2012-
dc.identifier.citationWIRELESS NETWORKS, v.18, no.4, pp.413 - 425-
dc.identifier.issn1022-0038-
dc.identifier.urihttp://hdl.handle.net/10203/101030-
dc.description.abstractMulticast is a scalable solution for group communications. In order to offer security for multicast applications, a group key has to be changed whenever a member joins or leaves the group. This incurs 1-affects-n problem, which is a constraint on scalability. Decentralized approaches solve the scalability problem by dividing a group into several subgroups that use independent group keys. These approaches, however, introduce new challenges: problem of trusting third party and inefficiency of data delivery. Proxy encryption is a good approach to solve the problem of trusting third party. In this paper, we propose a novel secure multicast scheme using the proxy cryptography. The proposed scheme provides not only scalability but also data transmission efficiency by dynamic subgrouping of group members while intermediate data-relaying third parties are not required to be trusted.-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.subjectKEY DISTRIBUTION-
dc.subjectMULTICAST-
dc.subjectBEHAVIOR-
dc.titleScalable and efficient approach for secure group communication using proxy cryptography-
dc.typeArticle-
dc.identifier.wosid000303202000005-
dc.identifier.scopusid2-s2.0-84862516726-
dc.type.rimsART-
dc.citation.volume18-
dc.citation.issue4-
dc.citation.beginningpage413-
dc.citation.endingpage425-
dc.citation.publicationnameWIRELESS NETWORKS-
dc.identifier.doi10.1007/s11276-011-0408-x-
dc.contributor.nonIdAuthorHur, Junbeom-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorMulticast-
dc.subject.keywordAuthorGroup key management-
dc.subject.keywordAuthorProxy encryption-
dc.subject.keywordAuthorData transformation-
dc.subject.keywordAuthorKey transformation-
dc.subject.keywordAuthorDynamic network-
dc.subject.keywordPlusKEY DISTRIBUTION-
dc.subject.keywordPlusMULTICAST-
dc.subject.keywordPlusBEHAVIOR-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0