@inproceedings{b89a8b4bece14712a2ec005228678bac,
title = "Key management for secure multicast with dynamic controller",
abstract = "Multicast security has been intensively studied in recent years. In all previous schemes a trusted group controller is essential. However this is a restrictive assumption in applications such as teleconferences among members of a dynamic group. This leads to the problem of constructing dynamic group controllers in the multicast environment. That is, after the initialisation of the system, each user in the group can establish a common key among a subset of users by broadcasting a message (or messages) such that only the users in the designated group are able to decrypt it. In this paper, we present two solutions, one based on key distribution patterns which can cater for both private key and public key settings, and the other using tree based key hierarchy structure by employing the Diffie-Hellman key exchange protocol. We assess security and efficiency of our proposed schemes.",
author = "Hartono Kurnio and Rei Safavi-Naini and Willy Susilo and Huaxiong Wang",
year = "2000",
doi = "10.1007/10718964_15",
language = "English",
isbn = "3540677429",
volume = "1841",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "178--190",
booktitle = "Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings",
address = "United States",
note = "5th Australasian Conference on Information Security and Privacy, ACISP 2000 ; Conference date: 10-07-2000 Through 12-07-2000",
}