Skip to main content

Scalable Group Key Management Protocol Based on Key Material Transmitting Tree

  • Conference paper
Information Security Practice and Experience (ISPEC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4464))

  • 528 Accesses

Abstract

The group key management is one of the most crucial problems in group communication. In dynamic and large-scale groups, the overhead of key generating and key updating is usually relevant to the group size, which becomes a performance bottleneck in achieving scalability. Therefore, scalable group key management protocol, which is independent from group size, is the basis for wide applications of group communication. The paper proposes a novel group key management protocol, which designates un-trusted routers over Internet as transmitting nodes to organize a key material transmitting tree for transmitting key material. Members in group that are partitioned into subgroups attach to different transmitting nodes, and compute SEK using received key material and own secret parameter. The overhead of key management can be shared by the transmitting nodes which can not reveal the data of group communications, and the overhead for key management of each transmitting node is independent of the group size. In addition, the new protocol conduces to constant computation and communication overhead during key updating.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Quinn, B., Almeroth, K.: IP Multicast Applications: Challenges and Solutions. In: IEFT RFC3170 (2001)

    Google Scholar 

  2. Cain, B., et al.: Internet Group Management Protocol, version 3. In: IEFT RFC3376 (2002)

    Google Scholar 

  3. Sandro, R., David, H.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309–329 (2003)

    Article  Google Scholar 

  4. Amir, Y., et al.: On the Performance of Group Key Agreement Protocols. ACM Transactions on Information and System Security 7(3), 457–488 (2004)

    Article  Google Scholar 

  5. Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology 2(2), 105–118 (2005)

    Google Scholar 

  6. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture. In: RFC 2093 (1997)

    Google Scholar 

  7. Chu, H.H., Qiao, L., Nahratedt, K.: A Secure Multicast Protocol with Copyright Protection. ACM SIGCOMM Computer Communications Review 32(2), 42–60 (2002)

    Article  Google Scholar 

  8. Wallner, D., Harder, E., Agee, R.: Key Management forMulticast: Issues and Architectures. In: IETF RFC2627 (1999)

    Google Scholar 

  9. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  10. Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-balenson-groupkeymgmt-oft-00.txt, Internet-Draft (1999)

    Google Scholar 

  11. Dunigan, T., Cao, C.: Group Key Management. Technical Report ORNL/TM-13470 (1998)

    Google Scholar 

  12. Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. ACM SIGCOMM 27(4), 277–288 (1997)

    Article  Google Scholar 

  13. Dondeti, L., Mukherjee, S., Samal, A.: A Dual Encryption Protocol for Scalable Secure Multicasting. In: Proceedings of the IEEE Symposium on Computer and Communications, Red Sea, Egypt, IEEE Computer Society Press, Los Almitos (1999)

    Google Scholar 

  14. Yang, W.H., Fan, K.W., Shieh, S.P.: A Secure Multicast Protocol for the Internet’s Multicast Backbone. ACM/PH International Journal Network Management 11, 129–136 (2001)

    Article  Google Scholar 

  15. Hardjono, T., Cain, B., Monga, I.: Intra-domain Group Key Management for Multicast Security. IETF Internet draft (2000)

    Google Scholar 

  16. Molva, R., Pannetrat, A.: Scalable Multicast Security with Dynamic Recipient Groups. ACM Transaction Information and System Security 3(3), 136–160 (2000)

    Article  Google Scholar 

  17. Setia, S., Koussih, S., Jajodia, S.: Kronos: A Scalable Group re-keying Approach for Secure Multicast. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, pp. 215–288. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  18. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 31–37 (1996)

    Google Scholar 

  19. Rodeh, O., Birman, K., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Network and Distributed System Security (2000)

    Google Scholar 

  20. Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceeding of the 7th ACM conference on Computer and Communications Security, pp. 235–244. ACM Press, New York (2000)

    Chapter  Google Scholar 

  21. Abdel-Hafez, A., Miri, A., Orazco-Barbosa, L.: Scalable and Fault-tolerant Key Agreement Protocol for Dynamic Groups. International Journal of Network Management 16, 185–291 (2006)

    Article  Google Scholar 

  22. Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  23. Boyd, C.: On Key Agreement and Conference Key Agreement. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 294–302. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  24. Lu, H.B.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Trans. on Computers 54(2), 214–224 (2005)

    Article  Google Scholar 

  25. Zheng, S.Y., David, M., Jim, A.F.: A Communication-Computation Efficient Group Key Algorithm for Large and Dynamic Groups (Available online 22 May 2006). Computer Networks 51, 69–83 (2007)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Duncan S. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Zheng, M., Cui, G., Yang, M., Li, J. (2007). Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72163-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72159-8

  • Online ISBN: 978-3-540-72163-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics