Abstract
The group key management is one of the most crucial problems in group communication. In dynamic and large-scale groups, the overhead of key generating and key updating is usually relevant to the group size, which becomes a performance bottleneck in achieving scalability. Therefore, scalable group key management protocol, which is independent from group size, is the basis for wide applications of group communication. The paper proposes a novel group key management protocol, which designates un-trusted routers over Internet as transmitting nodes to organize a key material transmitting tree for transmitting key material. Members in group that are partitioned into subgroups attach to different transmitting nodes, and compute SEK using received key material and own secret parameter. The overhead of key management can be shared by the transmitting nodes which can not reveal the data of group communications, and the overhead for key management of each transmitting node is independent of the group size. In addition, the new protocol conduces to constant computation and communication overhead during key updating.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Quinn, B., Almeroth, K.: IP Multicast Applications: Challenges and Solutions. In: IEFT RFC3170 (2001)
Cain, B., et al.: Internet Group Management Protocol, version 3. In: IEFT RFC3376 (2002)
Sandro, R., David, H.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309–329 (2003)
Amir, Y., et al.: On the Performance of Group Key Agreement Protocols. ACM Transactions on Information and System Security 7(3), 457–488 (2004)
Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology 2(2), 105–118 (2005)
Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture. In: RFC 2093 (1997)
Chu, H.H., Qiao, L., Nahratedt, K.: A Secure Multicast Protocol with Copyright Protection. ACM SIGCOMM Computer Communications Review 32(2), 42–60 (2002)
Wallner, D., Harder, E., Agee, R.: Key Management forMulticast: Issues and Architectures. In: IETF RFC2627 (1999)
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. draft-balenson-groupkeymgmt-oft-00.txt, Internet-Draft (1999)
Dunigan, T., Cao, C.: Group Key Management. Technical Report ORNL/TM-13470 (1998)
Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. ACM SIGCOMM 27(4), 277–288 (1997)
Dondeti, L., Mukherjee, S., Samal, A.: A Dual Encryption Protocol for Scalable Secure Multicasting. In: Proceedings of the IEEE Symposium on Computer and Communications, Red Sea, Egypt, IEEE Computer Society Press, Los Almitos (1999)
Yang, W.H., Fan, K.W., Shieh, S.P.: A Secure Multicast Protocol for the Internet’s Multicast Backbone. ACM/PH International Journal Network Management 11, 129–136 (2001)
Hardjono, T., Cain, B., Monga, I.: Intra-domain Group Key Management for Multicast Security. IETF Internet draft (2000)
Molva, R., Pannetrat, A.: Scalable Multicast Security with Dynamic Recipient Groups. ACM Transaction Information and System Security 3(3), 136–160 (2000)
Setia, S., Koussih, S., Jajodia, S.: Kronos: A Scalable Group re-keying Approach for Secure Multicast. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, pp. 215–288. IEEE Computer Society Press, Los Alamitos (2000)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 31–37 (1996)
Rodeh, O., Birman, K., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Network and Distributed System Security (2000)
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceeding of the 7th ACM conference on Computer and Communications Security, pp. 235–244. ACM Press, New York (2000)
Abdel-Hafez, A., Miri, A., Orazco-Barbosa, L.: Scalable and Fault-tolerant Key Agreement Protocol for Dynamic Groups. International Journal of Network Management 16, 185–291 (2006)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Boyd, C.: On Key Agreement and Conference Key Agreement. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 294–302. Springer, Heidelberg (1997)
Lu, H.B.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Trans. on Computers 54(2), 214–224 (2005)
Zheng, S.Y., David, M., Jim, A.F.: A Communication-Computation Efficient Group Key Algorithm for Large and Dynamic Groups (Available online 22 May 2006). Computer Networks 51, 69–83 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Zheng, M., Cui, G., Yang, M., Li, J. (2007). Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)