Provided by: International Association for Cryptologic Research
Date Added: Aug 2013
The increasing demand for on-line collaborative applications has sparked the interest for multicast services, which in many cases have to guarantee properties such as authentication or confidentiality within groups of users. To do so, cryptographic protocols are generally used and the cryptographic keys, in which they rely, have to be managed (e.g. created, updated and distributed). The procedures to perform these operations are determined by the so-called group key management schemes. Many schemes have been proposed and some of them have been proven to be vulnerable.