Skip to main content
Log in

Combinatorial Optimization of Group Key Management

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Given the growing number of group applications in many existing and evolving domains recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups that undergo frequent fluctuations in group membership, the need for efficient encryption key management becomes critical. This paper presents a new key management framework based on a combinatorial formulation of the group multicast key management problem that is applicable to the general problem of managing keys for any type of trusted group communication, regardless of the underlying transmission method between group participants. Specifically, we describe Exclusion Basis Systems and show exactly when they exist. In addition, the framework separates key management from encrypted message transmission, resulting in a more efficient implementation of key management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. A. Ballardie, Scalable multicast key distribution, RFC 1949, May 1996.

  2. S. Mitra, Iolus: A framework for scalable secure multicasting, Proceedings of ACM SIGCOMM '97, Cannes France, pp. 277–288, 1997.

  3. D. M. Wallner, E. J. Harder, and R. C. Agee, Key management for multicast: Issues and architectures, Informational RFC, draft-wallner-key-arch-00.txt, July 1997.

  4. H. Harney and C. Muckenhirn, Group Key Management Protocol (GKMP) Specification RFC 2093, July 1997.

  5. H. Harney and E. Harder, Group secure association key management protocol, draft-harney-sparta-gsakmp-sec-000.txt, April 1997. (Work in progress.)

  6. R. Canetti and B. Pinkas, A taxonomy of multicast security issues, Internet Draft, May 1998.

  7. C. K. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs, Proceedings of ACM SIGCOMM, Vancouver, BC, September 1998.

  8. I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, Key management for secure Internet multicast using Boolean function minimization techniques, Proceedings of Infocom '99, IEEE, March 1999.

  9. M. Eltoweissy and J. Bansemer, A framework for scalable multicast security with Bell-LaPadua confidentiality model, Journal of Internet Technology, Special Issue on Network Security, February 2002.

  10. S. Zhu, S. Setia, and S. Jajodia, Performance optimization for group key management schemes for secure multicast, Online Document, George Mason University, 2003.

  11. IETF Multicast Security Group, www.securemulticast.org

  12. A. Perrig, D. Song, and D. Tygore, ELK: A new protocol for efficient large-group key distribution, Proceedings of the IEEE Security and Privacy Symposium, May 2001.

  13. S. Banerjee and B. Bhattachajee, Scalable secure group communications over IP multicast, International Conference on Network Protocols (ICNP 2001), November 2001.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Eltoweissy.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Eltoweissy, M., Heydari, M.H., Morales, L. et al. Combinatorial Optimization of Group Key Management. Journal of Network and Systems Management 12, 33–50 (2004). https://doi.org/10.1023/B:JONS.0000015697.38671.ec

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:JONS.0000015697.38671.ec

Navigation