Abstract— We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They...May 8th, 2024
FiledMay 8th, 2024the rekeying information and the simplest way of recovery is to rebuild the key tree. We can explore the situations where Rebuild is applicable.
Abstract— We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They...January 30th, 2008
FiledJanuary 30th, 2008We first derive the expected number of renewed nodes. Consider a node v at level l. In a completely balanced tree, node v has N=2l descendants. At a rekeying instance, node v can be in one of the three distinct states: no-change, pruned, and renewed. Node v can be in the “no-change” state if none of its N=2l descendants wish to leave. Thus, the probability of node v being in the “no-change” state is