Abstract
Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed and of these the most efficient and scalable ones are based on logical key hierarchies (LKH) with symmetric keys organized in a tree. However, these solutions centralize trust in the group controller and make it an attractive attack target for access to communication keys for all groups supported by the controller. In this paper we propose a novel group key management approach, which uses a partially trusted controller that does not have access to communication keys and yet provides the same level of efficiency and scalability as LKH schemes. For this we develop a new public-key encryption scheme, which is based on El Gamal, and we show that the scheme is as secure as El Gamal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adamson, B., Bormann, C., Handley, M., Macker, J.: NACK-Oriented Reliable Multicast Protocol (NORM)., RMT Working Group INTERNET-DRAFT, draft-ietf-rmt-pi-norm-09 (January 2004)
Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal Multicast. ACM Transactions on Computer Systems 17(2), 41–88 (1999)
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic groups. In: Proceedings of the 7th Workshop Enabling Technologies, Cupertino, CA, IEEE Comp. Soc. Press, Los Alamitos (1998)
CERT E-crime Watch Survey. Carnegie Mellon Software Engineering Institute (May 2004), http://www.cert.org/about/ecrime.html
Gamal, T.E.: A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm. IEEE Transactions of Information Theory 31(4), 469–472 (1985)
Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (February 2003)
H. Khurana et al., Scalable Group Key Management with Partially Trusted Controllers (full length manuscript) (November 2004), available at http://www.ncsa.uiuc.edu/people/hkhurana
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of 7th ACM Conference on Computer and Communication Security, CCS (2000)
Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Transactions on Fundamentals E80-A(1) (1997)
Moyer, M., Rao, J., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast., draft-irtf-smug-key-tree-balance-00.txt, IETF Secure Multicast Group (June 1999)
Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys 35(3), 309–329 (2003)
Renesse, R.V., Birman, K.P., Hayden, M., Vaysburd, A.: Building adaptive systems using ensemble. Software–Practice and Experience 28(9), 963–979 (1998)
Rodeh, O., Birman, K., Dolev, D.: The Architecture and Performance of the Security Protocols in the Ensemble Group Communication System. Journal of ACM Transactions on Information Systems and Security, TISSEC (2001)
Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group ReKeying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 215–228 (2000)
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (August 2000)
Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures., Internet-draft (September 1998)
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Zhang, X.B., Lam, S.S., Lee, D.-Y., Yang, Y.R.: Protocol design for scalable and reliable group rekeying. IEEE/ACM Transactions on Networking 11(6), 908–922 (2003)
Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes for Secure Multicast. In: Proc.of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003) (May 2003)
Zhu, S., Setia, S., Jajodia, S.: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. In: Proc. of Networked Group Communication Conference (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khurana, H., Bonilla, R., Slagell, A., Afandi, R., Hahm, HS., Basney, J. (2005). Scalable Group Key Management with Partially Trusted Controllers. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_75
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)