Abstract
Multicast security has been intensively studied in recent years. In all previous schemes a trusted group controller is essential. However this is a restrictive assumption in applications such as teleconferences among members of a dynamic group. This leads to the problem of constructing dynamic group controllers in the multicast environment. That is, after the initialisation of the system, each user in the group can establish a common key among a subset of users by broadcasting a message (or messages) such that only the users in the designated group are able to decrypt it. In this paper, we present two solutions, one based on key distribution patterns which can cater for both private key and public key settings, and the other using tree based key hierarchy structure by employing the Diffie-Hellman key exchange protocol. We assess security and efficiency of our proposed schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999, 708–716 (1999)
Canetti, R., Malkin, T., Nissim, K.: Efficient Communication-Storage Tradeoffs forMulticast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)
Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key Management for Secure Internet Multicast Using Boolean Function Minimisation Techniques. In: INFOCOM 1999, pp. 689–698 (1999)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)
Dyer, M., Fenner, T., Frieze, A., Thomason, A.: On Key Storage in Secure Networks. Journal of Cryptology 8, 189–200 (1995)
McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees (1998) (Manuscript)
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Gong, L., Wheeler, D.J.: A Matrix Key-Distribution Scheme. Journal of Cryptology 2, 51–59 (1990)
Kumar, R., Rajagopalan, S., Sahai, A.: Coding Constructions for Blacklisting Problems Without Computational Assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609–623. Springer, Heidelberg (1999)
Mitchell, C.J., Piper, F.C.: Key Storage in Secure Networks. Discrete Applied Mathematics 21, 215–228 (1988)
O’Keefe, C.M.: Key Distribution Patterns Using Minkowski Planes. Designs, Codes and Cryptography 5, 261–267 (1995)
Quinn, K.A.S.: Some Constructions for Key Distribution Patterns. Designs, Codes and Cryptography 4, 177–191 (1994)
Shaffer, C.A.: A Practical Introduction to Data Structures and Algorithm Analysis. Prentice-Hall, Englewood Cliffs (1997)
Stinson, D.R.: On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption. Designs, Codes and Cryptography 12, 215–243 (1997)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. Internet Draft (draft-wallner-key-arch-01.txt), ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graphs. In: Proceedings of SIGCOMM 1998, pp. 68–79 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kurnio, H., Safavi-Naini, R., Susilo, W., Wang, H. (2000). Key Management for Secure Multicast with Dynamic Controller. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_15
Download citation
DOI: https://doi.org/10.1007/10718964_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive