ABSTRACT
1. Introduction
2. Contributions, Notations, Model
2.1 Our contributions
2.2 Notations
2.3 Our model
3. Definitions for Security Properties
4. Group Key Management Protocol
4.1 Setup
4.2 Broadcast
4.3 Group Key Recovery
4.4 Add group members
5. Analysis
5.1 Security Analysis
5.2 Cost Analysis
5.3 Comparison with Related works
6. Conclusion
References