—Group based applications have gained popularity in recent years. As these applications typically involve communication over open network, security is an important requirement. Group key management is one of main block in securing group communication. Though, centralized and distributed group key schemes rely on at least one explicit key manager for generating traffic key, contributory schemes employ the contribution of all members of a group for initiating new traffic key. This work presents an overview of existing contributory group key management schemes which specifically employ public key exchange algorithms for generating traffic key among members of a group. The initial operation which is used to generate first traffic key among members of group is demonstrated. Subsequently, required operations for provision of backward and forward secrecy during upon any changes in group membership are explored. And finally, the investigated schemes are analyzed and then compared in term of their communication cost.
—Group communication, group key managemen, cryptographic algorithms
Babak Daghighi and Laiha Mat Kiah are with the Faculty of Computer Science & IT, University of Malaya, KL, CO 50603 Malaysia (e-mail: firstname.lastname@example.org, email@example.com).
Saeedeh Afkhami Rad is with the Faculty of Computer Science, Azad University, Mashad, CO 80309 Iran (e-mail: firstname.lastname@example.org).
Cite:Babak Daghighi, Laiha Mat Kiah, and Saeedeh Afkhami Rad, "Group Key Management Using Public Key Exchange," International Journal of Computer Theory and Engineering vol. 5, no. 5, pp. 807-811, 2013.