{"title":"使用增强的单向功能树组密钥协议生成组密钥","authors":"B. Varthini, S. Valli","doi":"10.1109/ICCTA.2007.64","DOIUrl":null,"url":null,"abstract":"Group communication is the basis for many multimedia and web applications. The group key management is a critical problem in a large dynamic group. All group rekeying protocols incur communication and computation overhead at the group key controller and at the group members. EOFT (enhanced one way function tree) approach uses the CRT tuples of smaller remainders instead of keys of larger bits. EOFT reduces the overall computational and the communication rekeying overhead. This work computes the group key using EOFT with actual numeric values for the keys of the group members. Any computation of the keys is carried out in parallel on their CRT remainders. This work proves that the time complexity of CRT conversion is a negligible one compared to that of the cryptographic functions","PeriodicalId":308247,"journal":{"name":"2007 International Conference on Computing: Theory and Applications (ICCTA'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol\",\"authors\":\"B. Varthini, S. Valli\",\"doi\":\"10.1109/ICCTA.2007.64\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Group communication is the basis for many multimedia and web applications. The group key management is a critical problem in a large dynamic group. All group rekeying protocols incur communication and computation overhead at the group key controller and at the group members. EOFT (enhanced one way function tree) approach uses the CRT tuples of smaller remainders instead of keys of larger bits. EOFT reduces the overall computational and the communication rekeying overhead. This work computes the group key using EOFT with actual numeric values for the keys of the group members. Any computation of the keys is carried out in parallel on their CRT remainders. This work proves that the time complexity of CRT conversion is a negligible one compared to that of the cryptographic functions\",\"PeriodicalId\":308247,\"journal\":{\"name\":\"2007 International Conference on Computing: Theory and Applications (ICCTA'07)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computing: Theory and Applications (ICCTA'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTA.2007.64\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computing: Theory and Applications (ICCTA'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA.2007.64","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol
Group communication is the basis for many multimedia and web applications. The group key management is a critical problem in a large dynamic group. All group rekeying protocols incur communication and computation overhead at the group key controller and at the group members. EOFT (enhanced one way function tree) approach uses the CRT tuples of smaller remainders instead of keys of larger bits. EOFT reduces the overall computational and the communication rekeying overhead. This work computes the group key using EOFT with actual numeric values for the keys of the group members. Any computation of the keys is carried out in parallel on their CRT remainders. This work proves that the time complexity of CRT conversion is a negligible one compared to that of the cryptographic functions