Skip to main content

Key Management for Multicast Fingerprinting

  • Conference paper
Information Systems Security (ICISS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3803))

Included in the following conference series:

  • 1033 Accesses

Abstract

A secure multicast system allows a sender to send a message over a multicast channel to a dynamically changing group of users. A group key management solution, efficiently accommodating dynamic membership, is desirable. Fingerprinting technique has also been employed to trace traitors who illegally retransmit decrypted content to other unauthorized receivers. But, it makes key management much more challengeable. This paper studies this scenario, advances a notion of ”subgroup key management”, and indicates it should be collusion-free. Moreover, this paper also studies a general subset notion and employs it in subgroup key management approach. Especially, our dynamic key assignment scheme is a generalized mode of Logical Key Hierarchy (LKH). At same time, both symmetric and asymmetric cryptographic approaches for the subgroup key distribution are studied. Our approach can not only handle highly dynamic membership of a multicast session but also own very low overhead of communication, and it is collusion-free. Finally, the paper proves the security of proposed solutions and compares its efficiencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wu, T., Wu, S.: Selective encryption and watermarking of mpeg video, Tech. Rep., North Carolina State Univ

    Google Scholar 

  2. Brown, I., Perkins, C., Crowcroft, J.: Watercasting: distributed watermarking of multicast media. In: Proc. of the First Intl workshop on Networked Group Communication (1999)

    Google Scholar 

  3. Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a hierarchy of Intermediaries. Computer Networks 39(6), 699–712 (2002)

    Article  Google Scholar 

  4. Chu, H., Qiao, L., Nahrstedt, K.: A secure multicast protocol with copyright protection. ACM SIGCOMM Comp. Comm. Review 32(2), 42–60 (2002)

    Article  Google Scholar 

  5. Parviainen, R., Parnes, P.: Large Scale Distributed Watermarking of Multicast Media Through Encryption. In: Intl. Fed. for Info. Proc., Comm. and Multimedia Sec. Joint working Conf. IFIP Tc6 and TC11, May 21-22 (2001)

    Google Scholar 

  6. Chor, B.A., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)

    Google Scholar 

  7. Blakley, G.R., Meadows, C., Purdy, G.B.: Fingerprinting long forgiving messages. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 180–189. Springer, Heidelberg (1986)

    Google Scholar 

  8. Boneh, D., Shaw, J.: Collusion-secure Fingerprinting for digital data. IEEE Trans. on Info. Theory 44(5), 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  9. Domingo-Ferrer, J., Herrera-Joancomarti, J.: Short collusion-secure fingerprints based on dual binary hamming codes. Electronics Letters 36(20), 1697–1699 (2000)

    Article  Google Scholar 

  10. Safavi-Naini, R., Wang, Y.: Collusion secure q-ary fingerprinting for perceptual content. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 57–75. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE trans. on Info. Theory 47(3), 1042–1049 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  12. Guth, H., Pfitzmann, B.: Error- and collusion-secure fingerprinting for digital data. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 134–135. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Safavi-Naini, R., Wang, Y.: New results on frameproof codes and traceability schemes. IEEE Trans. on Info. Theory 47(7), 3029–3033 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  14. To, V.D., Safavi-Naini, R., Wang, Y.: A 2-secure Code with Efficient Tracing Algorithm. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 149–163. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Cohen, G., Litsyn, S., Zemor, G.: Binary Codes for Collusion-Secure Fingerprinting. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 178–185. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures, IETF draft wallner-key (July 1997)

    Google Scholar 

  17. Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  18. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. Halevi, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Asano, T.: A Revocation Scheme with Minimal Storage at Receivers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 433–450. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  21. Kurnio, H., Safavi-Naini, R., Wang, H.: Efficient Revocation Schemes for Secure Multicast. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 160–177. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Harn, L., Imai, H. (2005). Key Management for Multicast Fingerprinting. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_14

Download citation

  • DOI: https://doi.org/10.1007/11593980_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30706-8

  • Online ISBN: 978-3-540-32422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics