{"title":"基于子组方法的分布式组密钥建立协议的比较分析","authors":"R. C. Gangwar, A. Sarje","doi":"10.1109/ICETET.2008.45","DOIUrl":null,"url":null,"abstract":"Nowadays, Internet has become the common media of communication. Many group communication applications can easily be conducted on the Internet. Some group communication applications pose strict requirement that in case of network partitions or on each join/leave event, a group key establishment protocol should not execute itself afresh. Although many group key establishment protocols have been proposed in the literature, yet nothing has been done to establish their suitability for aforementioned scenarios. In this paper, we present the succinct description of different decentralized group key establishment protocols based on independent subgroup key approach. And analyze them against parameters such as key independence, one-affects-all, local rekey, data transformation.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative Analysis of Distributed Group Key Establishment Protocols Based on Subgroup Approach\",\"authors\":\"R. C. Gangwar, A. Sarje\",\"doi\":\"10.1109/ICETET.2008.45\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, Internet has become the common media of communication. Many group communication applications can easily be conducted on the Internet. Some group communication applications pose strict requirement that in case of network partitions or on each join/leave event, a group key establishment protocol should not execute itself afresh. Although many group key establishment protocols have been proposed in the literature, yet nothing has been done to establish their suitability for aforementioned scenarios. In this paper, we present the succinct description of different decentralized group key establishment protocols based on independent subgroup key approach. And analyze them against parameters such as key independence, one-affects-all, local rekey, data transformation.\",\"PeriodicalId\":269929,\"journal\":{\"name\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 First International Conference on Emerging Trends in Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2008.45\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2008.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Analysis of Distributed Group Key Establishment Protocols Based on Subgroup Approach
Nowadays, Internet has become the common media of communication. Many group communication applications can easily be conducted on the Internet. Some group communication applications pose strict requirement that in case of network partitions or on each join/leave event, a group key establishment protocol should not execute itself afresh. Although many group key establishment protocols have been proposed in the literature, yet nothing has been done to establish their suitability for aforementioned scenarios. In this paper, we present the succinct description of different decentralized group key establishment protocols based on independent subgroup key approach. And analyze them against parameters such as key independence, one-affects-all, local rekey, data transformation.