{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:03:44Z","timestamp":1761393824866,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030949"},{"type":"electronic","value":"9783642030956"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03095-6_26","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T17:40:55Z","timestamp":1248975655000},"page":"254-265","source":"Crossref","is-referenced-by-count":16,"title":["Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme"],"prefix":"10.1007","author":[{"given":"Jie","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yong-hao","family":"Ou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","first-page":"105","volume":"2","author":"Y. Challal","year":"2005","unstructured":"Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology\u00a02(1), 105\u2013118 (2005)","journal-title":"International Journal of Information Technology"},{"issue":"3","key":"26_CR2","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys\u00a035(3), 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"issue":"8B","key":"26_CR3","first-page":"141","volume":"6","author":"W.S. Juang","year":"2006","unstructured":"Juang, W.S., Wu, J.C.: An Efficient and Flexible Decentralized Multicast Key Distribution Scheme. International Journal of Computer Science and Network Security\u00a06(8B), 141\u2013150 (2006)","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1109\/TC.2007.1022","volume":"56","author":"W.H.D. Ng","year":"2007","unstructured":"Ng, W.H.D., Howarth, M., Sun, Z., Cruickshank, H.: Dynamic Balanced Key Tree Management for Secure Multicast Communications. IEEE Transactions on Computers\u00a056(5), 590\u2013605 (2007)","journal-title":"IEEE Transactions on Computers"},{"issue":"5","key":"26_CR5","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TPDS.2007.70759","volume":"19","author":"L. Xu","year":"2008","unstructured":"Xu, L., Huang, C.: Computation Efficient Multicast Key Distribution. IEEE Transactions on Parallel and Distributed Systems\u00a019(5), 577\u2013587 (2008)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"26_CR7","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture, RFC 2672, http:\/\/www.faqs.org\/rfcs\/rfc2627.html"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/LCOMM.2006.1603391","volume":"10","author":"D.W. Kwak","year":"2006","unstructured":"Kwak, D.W., Lee, S.J., Kim, J.W., Jung, E.J.: An Efficient LKH Tree Balancing Algorithm for Group Key Management. IEEE Communications Letters\u00a010(3), 222\u2013224 (2006)","journal-title":"IEEE Communications Letters"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification, RFC 2093 (1997), http:\/\/www.faqs.org\/rfcs\/rfc2627.html","DOI":"10.17487\/rfc2093"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) architecture. RFC 2094 (1997), http:\/\/www.faqs.org\/rfcs\/rfc2627.html","DOI":"10.17487\/rfc2094"},{"issue":"5","key":"26_CR11","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"A.T. Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Trans. On Software Engineering\u00a029(5), 444\u2013458 (2003)","journal-title":"IEEE Trans. On Software Engineering"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security:A Taxonomy and Some Efficient Constructions. In: Proceedings of the IEEE INFOCOM, New York, vol.\u00a02, pp. 708\u2013716 (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"26_CR13","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"A. Perrig","year":"2001","unstructured":"Perrig, A., Song, D., Tygar, J.D.: A new protocol for efficient large-group key distribution. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, Calif. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, X.L., Huang, C.T., Matthews, M.: Chinese Remainder Theorem Based Group Key Management, ACMSE 2007, Winston-Salem, North Carolina, USA, pp. 266\u2013271 (2007)","DOI":"10.1145\/1233341.1233389"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Lu, E.H., Hwang, W.Y., Harn, L., Lee, J.Y.: A Conference Key Distribution System Based On The Lagrange Interpolating Polynomial. In: Proceedings IEEE INFOCOM 1988, 7th Annual Joint Conference of IEEE Computer and Communication Society, pp. 1092\u20131094 (1988)","DOI":"10.1109\/INFCOM.1988.13027"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.H., Chen, C.Y.: A Conference Key Distribution Scheme Using Interpolating Polynomials. In: 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 963\u2013967 (2007)","DOI":"10.1109\/MUE.2007.8"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/3-540-46416-6_50","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"S. Berkovits","year":"1991","unstructured":"Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 535\u2013541. Springer, Heidelberg (1991)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"issue":"8","key":"26_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MC.2002.1023789","volume":"35","author":"J. Lotspiech","year":"2002","unstructured":"Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption\u2019s Bright Future. IEEE Computer\u00a035(8), 57\u201363 (2002)","journal-title":"IEEE Computer"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Huang, S.C.H., Du, D.Z.: New constructions on broadcast encryption key pre-distribution schemes. In: Huang, S.C.H., Du New, D.Z. (eds.) Proceedings IEEE INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a01, pp. 515\u2013523 (2005)","DOI":"10.1109\/INFCOM.2005.1497919"},{"issue":"2","key":"26_CR22","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TBC.2005.847600","volume":"51","author":"X. Du","year":"2005","unstructured":"Du, X., Wang, Y., Ge, J., Wang, Y.: An ID-based broadcast encryption for key distribution. IEEE Transactions on Broadcasting\u00a051(2), 264\u2013266 (2005)","journal-title":"IEEE Transactions on Broadcasting"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03095-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T15:44:13Z","timestamp":1739288653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03095-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030949","9783642030956"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03095-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}