Skip to main content

Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting

  • Conference paper
E-Commerce and Web Technologies (EC-Web 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3590))

Included in the following conference series:

Abstract

Secure multicasting is one of the most efficient ways of delivering electronic content like streaming mutimedia to a group of users. One of the biggest challenges in secure multicasting is distributing group keys to the multicast group and managing the same. Although researchers have addressed the problem before, none of them address the fact that multicasting is an unreliable process. Thus there is no gurantee that the group key, distributed via multicasting, will be available in its correct form at the receiver. In this paper we propose a reliable and secure content distribution scheme that uses multicasting. The scheme uses an asymmetric multicast group key that is generated using parameters publicly available to all members of the group. The group key is used to encrypt a session key which is then distributed piggybacked on the multicast stream. The encrypted session key is dispersed over the stream in such a manner that receipt of a finite number of fragments of the session key ensures that the session key can be correctly recreated at the receiving end.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cormen, T.H., et al.: Introduction to Algorithms, 2nd edn. McGraw Hill, New York (2001)

    MATH  Google Scholar 

  2. Rabin, M.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM 36(2), 335–348 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  3. Ray, I., Ray, I.: Anonymous and Secure Multicast Subscription. In: Gudes, E., Shenoi, S. (eds.) Research Directions in Data and Applications Security, Proceedings of the 16th IFIP TC-11, WG 11.3 Working Conference on Data and Applications Security, pp. 313–327. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  4. RSA Laboratories. RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography, Version 4.1 (2004), http://www.rsasecurity.com/rsalabs/ (last accessed on December 10, 2004)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ray, I., Kim, E., McConnell, R., Massey, D. (2005). Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting. In: Bauknecht, K., Pröll, B., Werthner, H. (eds) E-Commerce and Web Technologies. EC-Web 2005. Lecture Notes in Computer Science, vol 3590. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11545163_33

Download citation

  • DOI: https://doi.org/10.1007/11545163_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28467-3

  • Online ISBN: 978-3-540-31736-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics