Logical Key Tree Based Secure Multicast Protocol with Copyright Protection

Author(s):  
Wen-Tsuen Chen ◽  
Ho-Ling Hsu ◽  
Jeng-Long Chiang
1999 ◽  
Author(s):  
Hao-hua Chu ◽  
Lintian Qiao ◽  
Klara Nahrstedt

2002 ◽  
Vol 32 (2) ◽  
pp. 42-60 ◽  
Author(s):  
Hao-hua Chu ◽  
Lintian Qiao ◽  
Klara Nahrstedt ◽  
Hua Wang ◽  
Ritesh Jain

2012 ◽  
Vol 04 (04) ◽  
pp. 1250053 ◽  
Author(s):  
YOSHIHIRO INDO ◽  
TAKAAKI MIZUKI ◽  
TAKAO NISHIZEKI

Assume that there are players and an eavesdropper Eve of unlimited computational power and that several pairs of players have shared secret keys beforehand. In a key sharing graph, each vertex corresponds to a player, and each edge corresponds to a secret key shared by the two players corresponding to the ends of the edge. Given a key sharing graph, a player wishes to send a message to another player so that the eavesdropper Eve and any other player can get no information on the message. In this paper, we first give a necessary and sufficient condition on a key sharing graph for the existence of such a unicast protocol. We then extend the condition to the case where a multiple number of players other than the sender and receiver passively collude. We finally give a sufficient condition for the existence of a secure multicast protocol.


2010 ◽  
Vol 33 (2) ◽  
pp. 136-148 ◽  
Author(s):  
Dong-Hyun Je ◽  
Jun-Sik Lee ◽  
Yongsuk Park ◽  
Seung-Woo Seo

2012 ◽  
Vol 532-533 ◽  
pp. 753-757
Author(s):  
Yan Li ◽  
Zhi Peng Wang ◽  
Hao Xu

This paper proves multicast management belongs to problems of HDP, provides the cost analytical model of multicast logical key tree which applies HDPT. Based on the above analysis, the author proposes an improved multicast logical key management scheme termed as L-R logical key tree management scheme. L-R logical key tree management scheme is a kind of imbalanced multicast logical key tree, which is based on periodic re-key, according member nodes’ joining and leaving different probability, it employs different multicast key management strategy. The paper provides the design and calculation of the scheme, and realizes it in a simulation. By comparing this scheme with the typical LKH one, it shows clearly the scheme proposed in the paper is of high effect and low cost.


Sign in / Sign up

Export Citation Format

Share Document