1. Explain about group Diffie–Hellman key management scheme in detail.
2. Explain in detail about computation-efficient secure multicast key management which is based on GCD.
3. Explain about user leave operation performed on a clustered tree-based key management scheme.