Abstract
The problem of secure multicasting in a large and highly dynamical group of users is addressed, and a novel hierarchical key management framework is proposed, based on an appropriate combination of the updatable and static logical key hierarchies. It fits to the underlying architecture of an IP-based network, and reduces the synchronization problem which is a main issue regarding the necessary key update upon membership changes. The proposed solution employs a hybrid two-layer approach with the updatable key hierarchy in the upper layer and the static one in the bottom layer. It provides scalability, flexibility, efficiency and security. Although any static and updatable logical hierarchies can be employed, certain architectural issues of the proposed framework are considered. The security and performance of the proposed approaches are discussed and compared with the previously reported schemes, and advantages of the proposed approach are pointed out.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. IETF draft (July 1997), ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt
Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Halevi, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)
Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)
Mittra Iolus, S.: A framework for scalable secure multicasting. In: Proc. ACM SIGCOMM 1997, pp. 277–288 (September 1997)
Molva, R., Pannetrat, A.: Scalable multicast security with dynamic recipient groups. ACM Transactions on Information and System Security 3(3), 136–160 (2000)
Setia, S., Koussih, S., Jajodia, S.: Kronos: A scalable group re-keying approach for secure multicast. In: Proc. IEEE Symposium on Security and Privacy, pp. 215–228 (2000)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)
Zhu, S., Jajodia, S.: Scalable group rekeying for secure multicast: A survey. In: IWDC 2003. LNCS, vol. 2918, pp. 1–10. Springer, Heidelberg (2003)
Di Crescenzo, G., Kornievskaia, O.: Efficient re-keying protocols for multicast encryption. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 119–132. Springer, Heidelberg (2003)
Ki, J.H., Jim, H.J., Lee, D.H., Park, C.S.: Efficient multicast key management for stateless receivers. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 497–509. Springer, Heidelberg (2003)
Mihaljević, M.J.: Broadcast encryption schemes based on sectioned key tree. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 158–169. Springer, Heidelberg (2003)
Mihaljević, M.J.: Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 137–154. Springer, Heidelberg (2003)
Mihaljević, M.J.: Reconfigurable key management for broadcast encryption. IEEE Communications Letters 8 (2004) (accepted for publication)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, J., Mihaljevic, M.J., Harn, L., Imai, H. (2006). A Hierarchical Key Management Approach for Secure Multicast. In: Grass, W., Sick, B., Waldschmidt, K. (eds) Architecture of Computing Systems - ARCS 2006. ARCS 2006. Lecture Notes in Computer Science, vol 3894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11682127_30
Download citation
DOI: https://doi.org/10.1007/11682127_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-32765-3
Online ISBN: 978-3-540-32766-0
eBook Packages: Computer ScienceComputer Science (R0)