Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/38107
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lin, I.C. | en_US |
dc.contributor.author | 王宗銘 | zh_TW |
dc.contributor.author | Tang, S.S. | en_US |
dc.contributor.author | Wang, C.M. | en_US |
dc.contributor.author | 林詠章 | zh_TW |
dc.date | 2010 | zh_TW |
dc.date.accessioned | 2014-06-06T08:00:31Z | - |
dc.date.available | 2014-06-06T08:00:31Z | - |
dc.identifier.issn | 0010-4620 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11455/38107 | - |
dc.description.abstract | Secure multicast provides efficient delivery which includes an identical data from a source to multiple receivers. A common solution is to apply a symmetric key that is used to encrypt the transmitted data. However, the heavy cost of the rekeying process is the main problem in large and dynamic multicast groups. The tree-based architecture is widely used to reduce the rekeying cost in terms of storage, transmission and computation. However, it usually requires extra overhead to keep key tree balance which is in order to achieve logarithmic rekeying cost. In this paper, we shall propose a new RSA-like multicast key management scheme to solve the rekeying problem. Our protocol applies a star-based architecture to eliminate the rekeying processes and provide the good performance when the membership changes in a multicast group. Furthermore, we also provide an extended multicast scheme, in which we combine public-key and symmetric-key cryptosystems to enhance the performance of multicast encryption. | en_US |
dc.language.iso | en_US | zh_TW |
dc.relation | Computer Journal | en_US |
dc.relation.ispartofseries | Computer Journal, Volume 53, Issue 7, Page(s) 939-950. | en_US |
dc.relation.uri | http://dx.doi.org/10.1093/comjnl/bxp060 | en_US |
dc.subject | group communication | en_US |
dc.subject | rekeying | en_US |
dc.subject | key management | en_US |
dc.subject | secure multicasting | en_US |
dc.subject | tree | en_US |
dc.title | Multicast Key Management without Rekeying Processes | en_US |
dc.type | Journal Article | zh_TW |
dc.identifier.doi | 10.1093/comjnl/bxp060 | zh_TW |
item.openairetype | Journal Article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en_US | - |
item.grantfulltext | none | - |
item.fulltext | no fulltext | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 資訊科學與工程學系所 | - |
crisitem.author.parentorg | 理學院 | - |
Appears in Collections: | 資訊科學與工程學系所 |
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.