Skip to main content

Scalable Group Key Management with Partially Trusted Controllers

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed and of these the most efficient and scalable ones are based on logical key hierarchies (LKH) with symmetric keys organized in a tree. However, these solutions centralize trust in the group controller and make it an attractive attack target for access to communication keys for all groups supported by the controller. In this paper we propose a novel group key management approach, which uses a partially trusted controller that does not have access to communication keys and yet provides the same level of efficiency and scalability as LKH schemes. For this we develop a new public-key encryption scheme, which is based on El Gamal, and we show that the scheme is as secure as El Gamal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adamson, B., Bormann, C., Handley, M., Macker, J.: NACK-Oriented Reliable Multicast Protocol (NORM)., RMT Working Group INTERNET-DRAFT, draft-ietf-rmt-pi-norm-09 (January 2004)

    Google Scholar 

  2. Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal Multicast. ACM Transactions on Computer Systems 17(2), 41–88 (1999)

    Article  Google Scholar 

  3. Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  5. Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic groups. In: Proceedings of the 7th Workshop Enabling Technologies, Cupertino, CA, IEEE Comp. Soc. Press, Los Alamitos (1998)

    Google Scholar 

  6. CERT E-crime Watch Survey. Carnegie Mellon Software Engineering Institute (May 2004), http://www.cert.org/about/ecrime.html

  7. Gamal, T.E.: A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm. IEEE Transactions of Information Theory 31(4), 469–472 (1985)

    Article  MATH  Google Scholar 

  8. Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (February 2003)

    Google Scholar 

  9. H. Khurana et al., Scalable Group Key Management with Partially Trusted Controllers (full length manuscript) (November 2004), available at http://www.ncsa.uiuc.edu/people/hkhurana

  10. Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of 7th ACM Conference on Computer and Communication Security, CCS (2000)

    Google Scholar 

  11. Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Transactions on Fundamentals E80-A(1) (1997)

    Google Scholar 

  12. Moyer, M., Rao, J., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast., draft-irtf-smug-key-tree-balance-00.txt, IETF Secure Multicast Group (June 1999)

    Google Scholar 

  13. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys 35(3), 309–329 (2003)

    Article  Google Scholar 

  14. Renesse, R.V., Birman, K.P., Hayden, M., Vaysburd, A.: Building adaptive systems using ensemble. Software–Practice and Experience 28(9), 963–979 (1998)

    Article  Google Scholar 

  15. Rodeh, O., Birman, K., Dolev, D.: The Architecture and Performance of the Security Protocols in the Ensemble Group Communication System. Journal of ACM Transactions on Information Systems and Security, TISSEC (2001)

    Google Scholar 

  16. Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group ReKeying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 215–228 (2000)

    Google Scholar 

  17. Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (August 2000)

    Google Scholar 

  18. Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)

    Google Scholar 

  19. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  20. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures., Internet-draft (September 1998)

    Google Scholar 

  21. Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  22. Zhang, X.B., Lam, S.S., Lee, D.-Y., Yang, Y.R.: Protocol design for scalable and reliable group rekeying. IEEE/ACM Transactions on Networking 11(6), 908–922 (2003)

    Article  Google Scholar 

  23. Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes for Secure Multicast. In: Proc.of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003) (May 2003)

    Google Scholar 

  24. Zhu, S., Setia, S., Jajodia, S.: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. In: Proc. of Networked Group Communication Conference (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khurana, H., Bonilla, R., Slagell, A., Afandi, R., Hahm, HS., Basney, J. (2005). Scalable Group Key Management with Partially Trusted Controllers. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics