完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Yi-Rueien_US
dc.contributor.authorTzeng, Wen-Gueyen_US
dc.date.accessioned2017-04-21T06:56:19Z-
dc.date.available2017-04-21T06:56:19Z-
dc.date.issued2017-01-15en_US
dc.identifier.issn0140-3664en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.comcom.2016.08.001en_US
dc.identifier.urihttp://hdl.handle.net/11536/133211-
dc.description.abstractThis paper addresses the problem of managing a cryptographic group key among a large and highly dynamic group of members, who may miss group key update (rekey) messages frequently. We propose two provably-secure and practical schemes: KeyDer-GKM and ReEnc-GKM. The rekey process in these schemes has an O(logN) rekey message and O(logN) computation and storage cost for a member, where N is the number of group members. Moreover, our schemes have the following distinct features. (1) Each member is given only one private key and O(logN) public information. The private key remains unchanged during the membership period. For the public information, a member can hold them locally and update accordingly from each rekey message, or get them from a public bulletin if needed. (2) The size of published information is O(N) no matter how many rekey processes occur. The computation cost for a member, who has missed some rekey messages, to compute the up-to-date group key is always O(logN) no matter how many rekey messages have been missed. Our KeyDer-GKM scheme is very efficient since it can be implemented by using hash and XOR functions only. Our ReEnc-GKM scheme allows a member to reduce the cost of computing the up-to-date group key to one decryption by outsourcing logN operations. Both of our schemes are shown immune to the collusion attacks. For KeyDer-GKM, a set of collusive members cannot recover an unauthorized group key. For ReEnc-GKM, a set of collusive members cannot distinguish an unauthorized group key from a random string. (C) 2016 Elsevier B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectKey managementen_US
dc.subjectKey distributionen_US
dc.subjectMulticast securityen_US
dc.subjectBroadcast encryptionen_US
dc.subjectSelf-healingen_US
dc.titleGroup key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized membersen_US
dc.identifier.doi10.1016/j.comcom.2016.08.001en_US
dc.identifier.journalCOMPUTER COMMUNICATIONSen_US
dc.citation.volume98en_US
dc.citation.spage31en_US
dc.citation.epage42en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000393012700004en_US
顯示於類別:期刊論文