Skip to main content

Key Management for Secure Multicast with Dynamic Controller

  • Conference paper
Information Security and Privacy (ACISP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1841))

Included in the following conference series:

Abstract

Multicast security has been intensively studied in recent years. In all previous schemes a trusted group controller is essential. However this is a restrictive assumption in applications such as teleconferences among members of a dynamic group. This leads to the problem of constructing dynamic group controllers in the multicast environment. That is, after the initialisation of the system, each user in the group can establish a common key among a subset of users by broadcasting a message (or messages) such that only the users in the designated group are able to decrypt it. In this paper, we present two solutions, one based on key distribution patterns which can cater for both private key and public key settings, and the other using tree based key hierarchy structure by employing the Diffie-Hellman key exchange protocol. We assess security and efficiency of our proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)

    Google Scholar 

  2. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999, 708–716 (1999)

    Google Scholar 

  3. Canetti, R., Malkin, T., Nissim, K.: Efficient Communication-Storage Tradeoffs forMulticast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)

    Google Scholar 

  4. Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key Management for Secure Internet Multicast Using Boolean Function Minimisation Techniques. In: INFOCOM 1999, pp. 689–698 (1999)

    Google Scholar 

  5. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  6. Dyer, M., Fenner, T., Frieze, A., Thomason, A.: On Key Storage in Secure Networks. Journal of Cryptology 8, 189–200 (1995)

    Article  MATH  Google Scholar 

  7. McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees (1998) (Manuscript)

    Google Scholar 

  8. Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Google Scholar 

  9. Gong, L., Wheeler, D.J.: A Matrix Key-Distribution Scheme. Journal of Cryptology 2, 51–59 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  10. Kumar, R., Rajagopalan, S., Sahai, A.: Coding Constructions for Blacklisting Problems Without Computational Assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609–623. Springer, Heidelberg (1999)

    Google Scholar 

  11. Mitchell, C.J., Piper, F.C.: Key Storage in Secure Networks. Discrete Applied Mathematics 21, 215–228 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  12. O’Keefe, C.M.: Key Distribution Patterns Using Minkowski Planes. Designs, Codes and Cryptography 5, 261–267 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  13. Quinn, K.A.S.: Some Constructions for Key Distribution Patterns. Designs, Codes and Cryptography 4, 177–191 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  14. Shaffer, C.A.: A Practical Introduction to Data Structures and Algorithm Analysis. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  15. Stinson, D.R.: On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption. Designs, Codes and Cryptography 12, 215–243 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  16. Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. Internet Draft (draft-wallner-key-arch-01.txt), ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt

  17. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graphs. In: Proceedings of SIGCOMM 1998, pp. 68–79 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kurnio, H., Safavi-Naini, R., Susilo, W., Wang, H. (2000). Key Management for Secure Multicast with Dynamic Controller. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_15

Download citation

  • DOI: https://doi.org/10.1007/10718964_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67742-0

  • Online ISBN: 978-3-540-45030-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics