Abstract
A secure multicast system allows a sender to send a message over a multicast channel to a dynamically changing group of users. A group key management solution, efficiently accommodating dynamic membership, is desirable. Fingerprinting technique has also been employed to trace traitors who illegally retransmit decrypted content to other unauthorized receivers. But, it makes key management much more challengeable. This paper studies this scenario, advances a notion of ”subgroup key management”, and indicates it should be collusion-free. Moreover, this paper also studies a general subset notion and employs it in subgroup key management approach. Especially, our dynamic key assignment scheme is a generalized mode of Logical Key Hierarchy (LKH). At same time, both symmetric and asymmetric cryptographic approaches for the subgroup key distribution are studied. Our approach can not only handle highly dynamic membership of a multicast session but also own very low overhead of communication, and it is collusion-free. Finally, the paper proves the security of proposed solutions and compares its efficiencies.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wu, T., Wu, S.: Selective encryption and watermarking of mpeg video, Tech. Rep., North Carolina State Univ
Brown, I., Perkins, C., Crowcroft, J.: Watercasting: distributed watermarking of multicast media. In: Proc. of the First Intl workshop on Networked Group Communication (1999)
Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a hierarchy of Intermediaries. Computer Networks 39(6), 699–712 (2002)
Chu, H., Qiao, L., Nahrstedt, K.: A secure multicast protocol with copyright protection. ACM SIGCOMM Comp. Comm. Review 32(2), 42–60 (2002)
Parviainen, R., Parnes, P.: Large Scale Distributed Watermarking of Multicast Media Through Encryption. In: Intl. Fed. for Info. Proc., Comm. and Multimedia Sec. Joint working Conf. IFIP Tc6 and TC11, May 21-22 (2001)
Chor, B.A., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)
Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)
Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for digital data. IEEE Trans. on Info. Theory 44(5), 1897–1905 (1998)
Domingo-Ferrer, J., Herrera-Joancomarti, J.: Short collusion-secure fingerprints based on dual binary hamming codes. Electronics Letters 36(20), 1697–1699 (2000)
Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57–75. Springer, Heidelberg (2002)
Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE trans. on Info. Theory 47(3), 1042–1049 (2001)
Guth, H., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 134–135. Springer, Heidelberg (2000)
Safavi-Naini, R., Wang, Y.: New results on frameproof codes and traceability schemes. IEEE Trans. on Info. Theory 47(7), 3029–3033 (2001)
To, V.D., Safavi-Naini, R., Wang, Y.: A 2-secure Code with Efficient Tracing Algorithm. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 149–163. Springer, Heidelberg (2002)
Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 178–185. Springer, Heidelberg (2002)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures, IETF draft wallner-key (July 1997)
Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Halevi, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)
Asano, T.: A Revocation Scheme with Minimal Storage at Receivers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 433–450. Springer, Heidelberg (2002)
Kurnio, H., Safavi-Naini, R., Wang, H.: Efficient Revocation Schemes for Secure Multicast. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 160–177. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, J., Harn, L., Imai, H. (2005). Key Management for Multicast Fingerprinting. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_14
Download citation
DOI: https://doi.org/10.1007/11593980_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30706-8
Online ISBN: 978-3-540-32422-5
eBook Packages: Computer ScienceComputer Science (R0)