An efficient approach to group key management in secure multicast

被引:0
|
作者
Pour, AN [1 ]
Kumekawa, K [1 ]
Kato, T [1 ]
Itoh, S [1 ]
机构
[1] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
关键词
network security; secure multicast; group key management; communication overhead; performance;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This research proposes an efficient model and the associated algorithm for the group key management in secure multicast. The proposed model and algorithm are focusing on the communication where members of multicast groups join and leave the groups frequently. In this communication environment, it is pointed out that the group key delivery at the leave has more overhead than that at the join. In our model, the group key is constructed using secret values assigned to individual members, based on the difficulty of the discrete logarithm problem. The inverse values of the secret values are also used. Each member keeps the inverse values of the other members except that assigned to itself. When a new member joins a group, the group key is changed by the key server, and the new group key and the inverse values are sent to members by exploiting IP multicast. When a member leaves, the key server only informs remaining members who is leaving. The group key is changed by each of the remaining members using the inverse values. Using this approach, we can reduce computation complexity and communication overhead of the group key generation after a leave.
引用
收藏
页码:218 / 223
页数:6
相关论文
共 50 条
  • [21] Key management for secure overlay multicast
    Roh, JH
    Lee, KH
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 336 - 345
  • [22] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42
  • [23] Secure decentralized multicast key management scheme
    Yang, Ming
    Xiao, Yang
    Lu, Shan-Shan
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (01): : 20 - 24
  • [24] Dynamics of key management in secure satellite multicast
    Howarth, MP
    Iyengar, S
    Sun, ZL
    Cruickshank, H
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (02) : 308 - 319
  • [25] Approximation Algorithms for Key Management in Secure Multicast
    Chan, Agnes
    Rajaraman, Rajmohan
    Sun, Zhifeng
    Zhu, Feng
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 148 - +
  • [26] Proxy encryptions for secure multicast key management
    Mukherjee, R
    Atwood, JW
    LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 377 - 384
  • [27] Efficient secure multicast with well-populated multicast key trees
    Moharrum, M
    Mukkamala, R
    Eltoweissy, M
    TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 215 - 222
  • [28] Key Management for Secure Multicast Communication: A Survey
    Baddi, Youssef
    Ech-Cherif El Kettani, Mohamed Dafir
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [29] Key management and distribution for secure multimedia multicast
    Trappe, W
    Song, J
    Poovendran, R
    Liu, KJR
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 544 - 557
  • [30] Efficient rekey interval for minimum cost on secure multicast system using group key
    Lee, GY
    Lee, Y
    GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 1995 - 1999