Skip to main content

A Hierarchical Key Management Approach for Secure Multicast

  • Conference paper
Architecture of Computing Systems - ARCS 2006 (ARCS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3894))

Included in the following conference series:

  • 592 Accesses

Abstract

The problem of secure multicasting in a large and highly dynamical group of users is addressed, and a novel hierarchical key management framework is proposed, based on an appropriate combination of the updatable and static logical key hierarchies. It fits to the underlying architecture of an IP-based network, and reduces the synchronization problem which is a main issue regarding the necessary key update upon membership changes. The proposed solution employs a hybrid two-layer approach with the updatable key hierarchy in the upper layer and the static one in the bottom layer. It provides scalability, flexibility, efficiency and security. Although any static and updatable logical hierarchies can be employed, certain architectural issues of the proposed framework are considered. The security and performance of the proposed approaches are discussed and compared with the previously reported schemes, and advantages of the proposed approach are pointed out.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. IETF draft (July 1997), ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt

  2. Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  3. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Halevi, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Mittra Iolus, S.: A framework for scalable secure multicasting. In: Proc. ACM SIGCOMM 1997, pp. 277–288 (September 1997)

    Google Scholar 

  7. Molva, R., Pannetrat, A.: Scalable multicast security with dynamic recipient groups. ACM Transactions on Information and System Security 3(3), 136–160 (2000)

    Article  Google Scholar 

  8. Setia, S., Koussih, S., Jajodia, S.: Kronos: A scalable group re-keying approach for secure multicast. In: Proc. IEEE Symposium on Security and Privacy, pp. 215–228 (2000)

    Google Scholar 

  9. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  10. Zhu, S., Jajodia, S.: Scalable group rekeying for secure multicast: A survey. In: IWDC 2003. LNCS, vol. 2918, pp. 1–10. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Di Crescenzo, G., Kornievskaia, O.: Efficient re-keying protocols for multicast encryption. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 119–132. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Ki, J.H., Jim, H.J., Lee, D.H., Park, C.S.: Efficient multicast key management for stateless receivers. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 497–509. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Mihaljević, M.J.: Broadcast encryption schemes based on sectioned key tree. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 158–169. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Mihaljević, M.J.: Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 137–154. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Mihaljević, M.J.: Reconfigurable key management for broadcast encryption. IEEE Communications Letters 8 (2004) (accepted for publication)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Mihaljevic, M.J., Harn, L., Imai, H. (2006). A Hierarchical Key Management Approach for Secure Multicast. In: Grass, W., Sick, B., Waldschmidt, K. (eds) Architecture of Computing Systems - ARCS 2006. ARCS 2006. Lecture Notes in Computer Science, vol 3894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11682127_30

Download citation

  • DOI: https://doi.org/10.1007/11682127_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-32765-3

  • Online ISBN: 978-3-540-32766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics