{"title":"Contributory approaches to centralized key agreement in dynamic peer groups","authors":"A. Saxena, B. Soh","doi":"10.1109/ICON.2003.1266223","DOIUrl":null,"url":null,"abstract":"This paper has two contributions. In the first part of this paper we propose a new approach to contributory key agreement in dynamic peer groups (DPG) using a central controller. Our approach has certain advantages over other centralized approaches because it can be extended to a distributed environment. We discuss ways to extend our approach to adapt to arbitrary network failures by segregating a large group into smaller subgroups. Since each subgroup still requires access to a central controller, in the second part of this paper, we present a protocol that can be used to adapt to arbitrary network failures that disable the central controller.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2003.1266223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper has two contributions. In the first part of this paper we propose a new approach to contributory key agreement in dynamic peer groups (DPG) using a central controller. Our approach has certain advantages over other centralized approaches because it can be extended to a distributed environment. We discuss ways to extend our approach to adapt to arbitrary network failures by segregating a large group into smaller subgroups. Since each subgroup still requires access to a central controller, in the second part of this paper, we present a protocol that can be used to adapt to arbitrary network failures that disable the central controller.