Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016 (2016), Article ID 2750268, 7 pages
http://dx.doi.org/10.1155/2016/2750268
Research Article

Analysis and Improvement of Key Distribution Scheme for Secure Group Communication

1Department of Information and Telecommunication Engineering, Ming Chuan University, Taoyuan 333, Taiwan
2Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan 320, Taiwan

Received 16 November 2015; Accepted 2 March 2016

Academic Editor: Isao Echizen

Copyright © 2016 Jia Ning Luo and Ming Hour Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Liang, K. Zhang, X. Shen, and X. Lin, “Security and privacy in mobile social networks: challenges and solutions,” IEEE Wireless Communications, vol. 21, no. 1, pp. 33–41, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. L. A. Cutillo, R. Molva, and T. Strufe, “Safebook: a privacy-preserving online social network leveraging on real-life trust,” IEEE Communications Magazine, vol. 47, no. 12, pp. 94–101, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Abelson, R. Anderson, S. M. Bellovin et al., “Keys under doormats: mandating insecurity by requiring government access to all data and communications,” Journal of Cybersecurity, 2015. View at Publisher · View at Google Scholar
  4. S. Deering, “Host extensions for IP multicasting,” RFC 1112, IETF, August 1989.
  5. I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, “Key management for secure Internet multicast using Boolean function minimization techniques,” in Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societie (INFOCOM '99), pp. 689–698, Sharm El Sheik, Egypt, March 1999. View at Scopus
  6. D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Wan, J. Liu, and R. H. Deng, “HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Qin, R. H. Deng, S. Liu, and S. Ma, “Attribute-based encryption with efficient verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1384–1393, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Liu, Z. Cao, and D. S. Wong, “White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 76–88, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, Calif, USA, 2007.
  12. Z. Zhou and D. Huang, “An optimal key distribution scheme for secure multicast group communication,” in Proceedings of the IEEE INFOCOM, pp. 1–5, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Huang, S. Ata, and D. Medhi, “Establishing secure virtual trust routing and provisioning domains for future internet,” in Proceedings of the 53rd IEEE Global Communications Conference, pp. 1–6, IEEE, Miami, Fla, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Jia, Y. Chen, X. Mao, and R. Dou, “Efficient and scalable multicast key management using attribute based encryption,” in Proceedings of the IEEE International Conference on Information Theory and Information Security (ICITIS '10), pp. 426–429, Beijing, China, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, “Secure data processing framework for mobile cloud computing,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM '11), pp. 614–618, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. E. McCluskey, “Minimization of Boolean functions,” The Bell System Technical Journal, vol. 35, no. 6, pp. 1417–1444, 1956. View at Google Scholar