{"title":"使用秘密掩码模式的可伸缩组密钥更新方案","authors":"Y. M. Asem, A. Kara","doi":"10.1504/IJHPCN.2005.009422","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a group rekeying method for changing the multicast group key: matrix-mask based group rekeying \"MMGR\". In MMGR, the group controller constructs the rekeying message using a numerical matrix and the group members apply secret bit masks on the matrix to get the group key. MMGR does not need computationally expensive encryption of the group key before transmission and hence eliminates the need to decrypt it after receiving the rekeying message. In MMGR, the computational cost for group rekeying is constant with respect to the number of group members up to the capacity of the matrix used, and the rekeying message construction and the group key retrieval processes require simple logical operations.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A scalable group rekeying scheme using secret mask patterns\",\"authors\":\"Y. M. Asem, A. Kara\",\"doi\":\"10.1504/IJHPCN.2005.009422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a group rekeying method for changing the multicast group key: matrix-mask based group rekeying \\\"MMGR\\\". In MMGR, the group controller constructs the rekeying message using a numerical matrix and the group members apply secret bit masks on the matrix to get the group key. MMGR does not need computationally expensive encryption of the group key before transmission and hence eliminates the need to decrypt it after receiving the rekeying message. In MMGR, the computational cost for group rekeying is constant with respect to the number of group members up to the capacity of the matrix used, and the rekeying message construction and the group key retrieval processes require simple logical operations.\",\"PeriodicalId\":186142,\"journal\":{\"name\":\"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJHPCN.2005.009422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJHPCN.2005.009422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A scalable group rekeying scheme using secret mask patterns
In this paper, we propose a group rekeying method for changing the multicast group key: matrix-mask based group rekeying "MMGR". In MMGR, the group controller constructs the rekeying message using a numerical matrix and the group members apply secret bit masks on the matrix to get the group key. MMGR does not need computationally expensive encryption of the group key before transmission and hence eliminates the need to decrypt it after receiving the rekeying message. In MMGR, the computational cost for group rekeying is constant with respect to the number of group members up to the capacity of the matrix used, and the rekeying message construction and the group key retrieval processes require simple logical operations.