{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:32:44Z","timestamp":1741753964272,"version":"3.38.0"},"reference-count":0,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2004,9,1]]},"abstract":"<jats:p> This paper brings up a new concern regarding efficient re-keying of large groups with dynamic membership: minimizing the overall time it takes for the key server and the group members to process the re-keying message. Specifically, we concentrate on re-keying algorithms based on the Logical Key Hierarchy (LKH), and minimize the longest sequence of encryptions and decryptions that need to be done in a re-keying operation. We first prove a lower bound on the time required to perform a re-keying operation in this model, then we provide an optimal schedule of re-keying messages matching the above lower bound. In particular, we show that the optimal schedule can be found only when the ariety of the LKH key graph is chosen according to the available communication bandwidth and the users processing power. Our results show that key trees of ariety 3, commonly assumed to be optimal, are not optimal when used in high bandwidth networks, or networks of devices with low computational power like sensor networks. <\/jats:p>","DOI":"10.3233\/jcs-2004-12502","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T07:33:28Z","timestamp":1463556808000},"page":"693-709","source":"Crossref","is-referenced-by-count":4,"title":["Key management for high bandwidth secure multicast"],"prefix":"10.1177","volume":"12","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Roma \u201cLa Sapienza\u201d, Roma, Italy., ,"}]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Roma \u201cLa Sapienza\u201d, Roma, Italy., ,"}]},{"given":"Alessandro","family":"Mei","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 di Roma \u201cLa Sapienza\u201d, Roma, Italy., ,"}]}],"member":"179","published-online":{"date-parts":[[2004,9,1]]},"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2004-12502","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2004-12502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T10:38:17Z","timestamp":1741689497000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-2004-12502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,1]]},"references-count":0,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,9,1]]}},"alternative-id":["10.3233\/JCS-2004-12502"],"URL":"https:\/\/doi.org\/10.3233\/jcs-2004-12502","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"type":"print","value":"0926-227X"},{"type":"electronic","value":"1875-8924"}],"subject":[],"published":{"date-parts":[[2004,9,1]]}}}