In this chapter, we describe two contributory schemes that employ novel tree structures and rekeying algorithms, with the aim to achieve the low bound of rekeying cost. Particular, the first method, referred to as JET [60, 63], uses a special join-tree/exit-tree topology and takes advantage of cost amortization. This method can significantly reduce the rekeying cost for user join. The second method is consist of a new key tree structure, called PFMH, and a key agreement protocol, called PACK [64, 65]. This method only needs O(1) rounds of two-party DH upon any single user join event and O(log n) rounds of two-party DH upon any single user leave event, which achieves the lower bound described in the previous paragraph.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2008). Optimizing Rekeying Costs in Group Key Agreement. In: Network-Aware Security for Group Communications. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68848-0_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-68848-0_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-68846-6
Online ISBN: 978-0-387-68848-0
eBook Packages: EngineeringEngineering (R0)