Kronos: a scalable group re-keying approach for secure multicast

@article{Setia2000KronosAS,
  title={Kronos: a scalable group re-keying approach for secure multicast},
  author={Sanjeev Setia and Samir Koussih and Sushil Jajodia and Eric Harder},
  journal={Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000},
  year={2000},
  pages={215-228}
}
The authors describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency of rekeying becomes the primary bottle neck for scalable group re-keying. In contrast, Kronos can scale to… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 218 CITATIONS

Hierarchies of keys in secure multicast communications

  • Journal of Computer Security
  • 2010
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Secure Multicast in WiMAX

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Multicast Group Key Distribution a Review

VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Group Communications and Charges. Technology and Business Models

  • Lecture Notes in Computer Science
  • 2003
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Hydra: a decentralised group key management

  • Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
  • 2002
VIEW 4 EXCERPTS
HIGHLY INFLUENCED

A secure multicast protocol with copyright protection

  • Computer Communication Review
  • 1999
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

LeaSel : A Highly Secure Scalable Multicast Model

ELIJAH BLESSING.R
    VIEW 7 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    1999
    2019

    CITATION STATISTICS

    • 21 Highly Influenced Citations

    References

    Publications referenced by this paper.