Tree-type secure multicast scheme based on digital certificate

被引:0
|
作者
Tian, Wenchun [1 ]
Wei, Gang [1 ]
机构
[1] Res. Inst. of Radio Eng., South China Univ. of Technol., Guangzhou 510640, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
A new scheme based on digital certificate is proposed to implement secure multicast. In the scheme, tree-type multicast topology (multicast tree) is adopted. Each node of the multicast tree possesses a digital certificate which may indicate its identity in the multicast group. Also the certificate may be used for distributing session-key and authenticating session data. So the complexity of managing multicast group key is reduced. And because of tree-type structure of the multicast group, the joining and leaving for multicast member is more scalable.
引用
收藏
页码:1815 / 1820
相关论文
共 50 条
  • [31] Deterministic tree-type algorithm with reservation mechanism
    Kawano, Hiroyuki
    Hasegawa, Toshiharu
    Nishio, Shojiro
    Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi), 1993, 76 (03): : 55 - 64
  • [32] THE OPTIMAL BASE OF A MATROID WITH TREE-TYPE CONSTRAINTS
    薛珏
    Acta Mathematicae Applicatae Sinica(English Series), 1988, (02) : 97 - 108
  • [33] On the Maximal Mostar Index of Tree-Type Phenylenes
    Liu, Hechao
    POLYCYCLIC AROMATIC COMPOUNDS, 2022, 42 (06) : 3829 - 3842
  • [34] GVF computation in tree-type channel networks
    Naidu, BJ
    Bhallamudi, SM
    Narasimhan, S
    JOURNAL OF HYDRAULIC ENGINEERING-ASCE, 1997, 123 (08): : 700 - 708
  • [35] On the Permanental Sum of the Tree-Type Polyphenyl System
    Ren, Shengzhang
    Wu, Tingzeng
    Cao, Fangzhou
    Kang, Huping
    Gu, Yang
    POLYCYCLIC AROMATIC COMPOUNDS, 2022, 42 (05) : 2843 - 2851
  • [36] MINIMIZATION OF TREE-TYPE UNIVERSAL LOGIC CIRCUITS
    CHEUNG, CC
    EHRICH, RW
    IEEE TRANSACTIONS ON COMPUTERS, 1975, 24 (11) : 1110 - 1113
  • [37] Logical key tree based secure multicast protocol with copyright protection
    Chen, WT
    Hsu, HL
    Chiang, JL
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 279 - 284
  • [38] Provably secure certificate- based key- insulated signature scheme
    Li, Jiguo
    Du, Haiting
    Zhang, Yichen
    Li, Tao
    Zhang, Yuexin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08): : 1546 - 1560
  • [39] PROVABLE SECURE CERTIFICATE-BASED SIGNATURE SCHEME FROM BILINEAR PAIRING
    Khatoon, Shaheena
    Chen, Te-Yu
    Lee, Cheng-Chi
    Khan, Muhammad Khurram
    APPLIED AND COMPUTATIONAL MATHEMATICS, 2018, 17 (03) : 295 - 306
  • [40] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163