Key storage in secure networks

@article{Mitchell1988KeySI,
  title={Key storage in secure networks},
  author={Chris J. Mitchell and Fred Piper},
  journal={Discrete Applied Mathematics},
  year={1988},
  volume={21},
  pages={215-228}
}
In this paper the key storage problem associated with the provision of secure communications between every pair of users in a large network is described, and a possible method of alleviating the problem is discussed. This method, based on the use of finite incidence structures with special properties called key distribution patterns, is shown to generalize earlier work in the area. The more general formulation of the storage saving scheme contained here enables use to be made of the extensive… CONTINUE READING
Highly Influential
This paper has highly influenced 17 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 239 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 103 extracted citations

Constructions for Key Distribution Pattern using Resolvable Designs

CHEN SHANGDI Civil
2014
View 4 Excerpts
Highly Influenced

Generalised key distribution patterns

View 10 Excerpts
Method Support
Highly Influenced

The Rise and Fall and Rise of Combinatorial Key Predistribution

Selected Areas in Cryptography • 2010
View 7 Excerpts
Highly Influenced

The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme

IEEE Transactions on Information Forensics and Security • 2010
View 6 Excerpts
Method Support
Highly Influenced

Tree-Based Key Distribution Patterns

Selected Areas in Cryptography • 2005
View 4 Excerpts
Highly Influenced

Broadcast encryption with short keys and transmissions

Digital Rights Management Workshop • 2003
View 3 Excerpts
Highly Influenced

Ðåàëèçàöèÿ Vpn Íà Îñíîâå Kdp-ñõåìû

Ðîññèÿ
2016
View 9 Excerpts
Highly Influenced

239 Citations

01020'95'00'06'12'18
Citations per Year
Semantic Scholar estimates that this publication has 239 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Combinatorics (Cambridge

B. Bollobas
1986

The cost of reducing key storage requirements in secure networks

F. C. Piper
Comput . Security • 1986

Non-Public Key Distribution

CRYPTO • 1982
View 2 Excerpts

Finite Geometries (Springer

P. Dembowski
New York, • 1968