Loading…

A Survey on Group Key Management Schemes

Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challe...

Full description

Saved in:
Bibliographic Details
Published in:Cybernetics and information technologies : CIT 2015-09, Vol.15 (3), p.3-25
Main Authors: Seetha, R., Saravanan, R.
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.
ISSN:1314-4081
1314-4081
DOI:10.1515/cait-2015-0038