Optimizing the Rekeying Cost for Contributory Group Key Agreement Schemes
#1

Optimizing the Rekeying Cost for Contributory Group Key Agreement Schemes
Abstract—
Although a contributory group key agreement is a promising solution to achieve access control in collaborative and dynamic
group applications, the existing schemes have not achieved the performance lower bound in terms of time, communication, and
computation costs. In this paper, we propose a contributory group key agreement that achieves the performance lower bound by
utilizing a novel logical key tree structure, called PFMH, and the concept of phantom user position. In particular, the proposed scheme
only needs Oð1Þ rounds of the two-party Diffie-Hellman (DH) upon any single-user join event and Oðlog nÞ rounds of the two-party DH
upon any single-user leave event. Both the theoretical bound analysis and simulation show that the proposed scheme achieves a lower
rekeying cost than the existing tree-based contributory group key agreement schemes.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ad agency agreement, optimizing a website, charter school management agreement, optimizing design of spring using genetic algorithm, reference for secure multi signature generation for group key generation with pdf, rental agreement template, optimizing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Network Connectivity with a Family of Group Mobility Models Projects9 0 733 23-01-2012, 04:47 PM
Last Post: Projects9
  On Group Nearest Group Query Processing Projects9 0 1,231 23-01-2012, 04:03 PM
Last Post: Projects9
  Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Projects9 0 873 20-01-2012, 06:30 PM
Last Post: Projects9
  Three Party Authentications for key Distributed Protocol using Implicit and Explicit mechanical engineering crazy 5 3,404 19-10-2011, 09:44 AM
Last Post: seminar addict
  RSA – Public Key Cryptography Algorithm seminar class 1 2,067 13-08-2011, 12:03 AM
Last Post: ja_mir05
  Key Management for Transcrypt smart paper boy 0 711 11-08-2011, 09:31 AM
Last Post: smart paper boy
  Key Management for Transcrypt computer science crazy 0 660 10-08-2011, 02:03 PM
Last Post: computer science crazy
  KTR: an Efficient Key Management Scheme for Secure Data Access Control seminar presentation 7 4,676 09-08-2011, 09:46 AM
Last Post: seminar addict
  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting project topics 1 1,556 15-06-2011, 07:00 PM
Last Post: santhoshreddy challa
  A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM computer science technology 2 2,260 20-05-2011, 09:36 PM
Last Post: seminar-database

Forum Jump: