A Secure Multicast Protocol Based on Pairings on Elliptic Curves

Provided by: International Journal of Information Security Science (IJISS)
Topic: Security
Format: PDF
Information security is an ever-present concern that is gaining more and more attention as digitalization of information and use of Internet increases. Numerous privacy protocols, standards and applications exist in order to keep information away from unauthorized persons, as well as to authenticate its author. Traditional cryptosystems are very effective when trying to provide confidentiality to communications between two parties and are usually known as unicast communications. However, unicast secure protocols cannot be used in some situations mainly due to the nature of the information to be transmitted since it can collapse the server or the network with the big amount of data being transmitted.

Find By Topic