Skip to main content
Log in

Optimal tree structure with loyal users and batch updates

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

We study the probabilistic model in the key tree management problem. Users have different behaviors. Normal users have probability p to issue join/leave request while the loyal users have probability zero. Given the numbers of such users, our objective is to construct a key tree with minimum expected updating cost. We observe that a single LUN (Loyal User Node) is enough to represent all loyal users. When 1−p≤0.57 we prove that the optimal tree that minimizes the cost is a star. When 1−p>0.57, we try to bound the size of the subtree rooted at every non-root node. Based on the size bound, we construct the optimal tree using dynamic programming algorithm in O(nK+K 4) time where K=min {4(log (1−p)−1)−1,n} and n is the number of normal users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Chen ZZ, Feng Z, Li M, Yao F (2008) Optimizing deletion cost for secure multicast key management. Theor Comput Sci 401(1–3):52–61

    Article  MathSciNet  MATH  Google Scholar 

  • Graham RL, Li M, Yao FF (2007) Optimal tree structures for group key management with batch updates. SIAM J Discrete Math 21(2):532–547

    Article  MathSciNet  MATH  Google Scholar 

  • Li XS, Yang YR, Gouda MG, Lam SS (2001) Batch rekeying for secure group communications. In: WWW ’01: Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 525–534

    Chapter  Google Scholar 

  • Onen M, Molva R (2004) Reliable group rekeying with a customer perspective. In: Global telecommunications conference, GLOBECOM, 2004, vol 4. IEEE, New York, pp 2072–2076

    Google Scholar 

  • Snoeyink J, Suri S, Varghese G (2005) A lower bound for multicast key distribution. Comput Netw 47(3):429–441

    Article  MATH  Google Scholar 

  • Wong CK, Gouda M, Lam SS (2000) Secure group communications using key graphs. IEEE/ACM Trans Netw 8(1):16–30

    Article  Google Scholar 

  • Wu W, Li M, Chen E (2008) Optimal key tree structure for deleting two or more leaves. In: ISAAC ’08: Proceedings of the 19th international symposium on algorithms and computation. Springer, Berlin/Heidelberg, pp 77–88

    Google Scholar 

  • Wu W, Li M, Chen E (2009) Optimal tree structures for group key tree management considering insertion and deletion cost. Theor Comput Sci 410(27–29):2619–2631

    Article  MathSciNet  MATH  Google Scholar 

  • Zhu F, Chan A, Noubir G (2003) Optimal tree structure for key management of simultaneous join/leave in secure multicast. In: Military communications conference, MILCOM, 2003, vol 2. IEEE, New York, pp 773–778

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiwei Wu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chan, YK., Li, M. & Wu, W. Optimal tree structure with loyal users and batch updates. J Comb Optim 22, 630–639 (2011). https://doi.org/10.1007/s10878-010-9312-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-010-9312-z

Keywords

Navigation