Multi-layer multicast key management with threshold cryptography

被引:0
|
作者
Dexter, S [1 ]
Belostotskiy, R [1 ]
Eskicioglu, AM [1 ]
机构
[1] CUNY Brooklyn Coll, Dept Comp & Informat Sci, Brooklyn, NY 11210 USA
关键词
multicast security; group communications; secret sharing; key management; set graphs; encryption; scalable video;
D O I
10.1117/12.526662
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yields a scheme that is both more flexible and provably secure. Both the key-based and share-based hierarchical key distribution tree techniques are designed for managing keys for a single data stream. Recent work shows how redundancies that arise when this scheme is extended to multi-stream (e.g. scalable video) applications may be exploited in the key-based system by viewing the set of clients as a "multi- group,,. In this paper, we present results from an adaptation of a multi-group key management scheme using threshold cryptography. We describe how the multi-group scheme is adapted to work with secret shares, and compare this scheme with a naive multi-stream key-management solution by measuring performance across several critical parameters, including tree degree, multi-group size, and number of shares stored at each node.
引用
收藏
页码:705 / 715
页数:11
相关论文
共 50 条
  • [1] Multi-layer key management for secure multimedia multicast communications
    Sun, Y
    Liu, KJR
    [J]. 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 205 - 208
  • [2] Multi-layer optimization for QKD and key management networks
    Wenning, Mario
    Samonaki, Maria
    Patri, Sai Kireet
    Fehenberger, Tobias
    Mas-Machuca, Carmen
    [J]. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2023, 15 (11) : 938 - 947
  • [3] Blocking probabilities of multi-layer multicast streams
    Karvo, J
    Aalto, S
    Virtamo, J
    [J]. HPSR 2002: WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, PROCEEDINGS: MERGING OPTICAL AND IP TECHNOLOGIES, 2002, : 268 - 277
  • [4] Key Management Scheme for Multi-Layer Secure Group Communication
    Aparna, R.
    Amberker, B. B.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 218 - +
  • [5] Multi-layer control management
    Grammel, G
    Belotti, S
    Luchesini, L
    Papadimitriou, D
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2005, (03): : 227 - 231
  • [6] Multi-layer network design with multicast traffic and statistical multiplexing
    Capone, Antonio
    Carello, Giuliana
    Matera, Riccardo
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 2565 - 2570
  • [7] Minimizing Resource Reservation for Multicast Protection with Multi-layer Approach
    Chiewcharat, Pornpong
    Saivichit, Chaiyachet
    [J]. ECTI-CON: 2009 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 852 - 855
  • [8] Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc
    Lee, KH
    Han, SB
    Suh, HS
    Hwang, CS
    Lee, S
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 321 - 329
  • [9] Algebraic Multi-Layer Network: Key Concepts
    Khanykov, Igor
    Nenashev, Vadim
    Kharinov, Mikhail
    [J]. JOURNAL OF IMAGING, 2023, 9 (07)
  • [10] Femtosecond damage threshold of multi-layer metal films
    Ibrahim, WMG
    Elsayed-Ali, H
    Shinn, M
    Bonner, CE
    [J]. LASER-INDUCED DAMAGE IN OPTICAL MATERIALS: 2002 AND 7TH INTERNATIONAL WORKSHOP ON LASER BEAM AND OPTICS CHARACTERIZATION, 2003, 4932 : 55 - 65