Meri Leeworthy

Multicast encryption

Modular Design of Secure Group Messaging Protocols and the Security of MLS

TreeKEM is also related to schemes for (symmetric-key) Broadcast encryption [ 16 , 18 ] and multicast encryption [ 12 , 24 , 30 ]

[12] R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In IEEE INFOCOM’99, pages 708–716, New York, NY, USA, Mar. 21–25, 1999

[24] S. Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of ACM SIGCOMM, pages 277–288, Cannes, France, Sept. 14–18, 1997

[30] C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1):16–30, Feb. 2000

I live and work on the land of the Wurundjeri people of the Kulin Nation. I pay respect to their elders past and present and acknowledge that sovereignty was never ceded. Always was, always will be Aboriginal land.

This site uses open source typefaces, including Sligoil by Ariel Martín Pérez, and Vercetti by Filippos Fragkogiannis