Key management for restricted multicast using broadcast encryption

被引:46
|
作者
Abdalla, M
Shavitt, Y
Wool, A
机构
[1] Lucent Technol, Bell Labs, Holmdel, NJ 07733 USA
[2] Lucent Technol, Bell Labs, Murray Hill, NJ 07974 USA
关键词
D O I
10.1109/90.865073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem we address is how to communicate securely with a set of users (the target set) over an insecure broadcast channel, This problem occurs in two application domains: satellite/cable pay TV and the Internet MBone, In these systems, the parameters of major concern are the number of key transmissions and the number of keys held by each receiver. In the Internet domain, previous schemes suggest building a separate key tree for each multicast program, thus incurring a setup cost of at least Ic log k per program for target sets of size k. In the pay-TV domain, a single key structure is used for all programs, but known theoretical bounds show that either very long transmissions are required, or that each receiver needs to keep prohibitively many keys, Our approach Is targeted at both domains, Our schemes maintain a single key structure that requires each receiver to keep only a logarithmic number of establishment keys for its entire lifetime. At the same time our schemes admit low numbers of transmissions. In order to achieve these goals, and to break away from the theoretical bounds, we allow a controlled number of users outside the target set to occasionally receive the multicast. This relaxation is appropriate for many scenarios in which the encryption is used to force consumers to pay for a service, rather than to withhold sensitive information. For this purpose, we introduce f-redundant establishment key allocations, which guarantee that the total number of recipients is no more than f times the number of intended recipients. We measure the performance of such schemes by the number of key transmissions they require, by their redundancy f, and by the probability that a user outside the target set (a free-rider) will be able to decrypt the multicast, We prove a new lower bound, present several new establishment key allocations, and evaluate our schemes' performance by extensive simulation.
引用
收藏
页码:443 / 454
页数:12
相关论文
共 50 条
  • [1] PROFICIENT KEY MANAGEMENT SCHEME FOR MULTICAST GROUPS USING GROUP KEY AGREEMENT AND BROADCAST ENCRYPTION
    Abirami, E.
    Padmavathy, T.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [2] Reconfigurable key management for broadcast encryption
    Mihaljevic, MJ
    [J]. IEEE COMMUNICATIONS LETTERS, 2004, 8 (07) : 440 - 442
  • [3] New Key Management Approach for Broadcast and Multicast Services
    Hwang, Sungoh
    Seleznev, Sergey
    Lee, Jae Yong
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (02) : 262 - 264
  • [4] Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1593 - 1600
  • [5] A Reliable Group Key Management Scheme for Broadcast Encryption
    Hur, Junbeom
    Lee, Younho
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (02) : 246 - 260
  • [6] Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption
    A.F. Metwaly
    M.Z. Rashad
    F.A. Omara
    A.A. Megahed
    [J]. The European Physical Journal Special Topics, 2014, 223 : 1711 - 1728
  • [7] Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption
    Metwaly, A. F.
    Rashad, M. Z.
    Omara, F. A.
    Megahed, A. A.
    [J]. EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1711 - 1728
  • [8] Broadcast Encryption Using Probabilistic Key Distribution and Applications
    Ramkumar, Mahalingam
    [J]. JOURNAL OF COMPUTERS, 2006, 1 (03) : 1 - 12
  • [9] Efficient public key broadcast encryption using identifier of receivers
    Lee, Jung Wook
    Hwang, Yong Ho
    Lee, Pil Joong
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 153 - 164
  • [10] Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
    Ren, Yi
    Chen, Jyh-Cheng
    Chin, Jui-Chih
    Tseng, Yu-Chee
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8463 - 8476