Skip to main content

Probabilistic Methods in Multicast Key Management

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1975))

Abstract

The Logical Key Hierarchy (LKH) scheme and its derivatives are among the most efficient protocols for multicast key management. Traditionally, the key distribution tree in an LKH-based protocol is organized as a balanced binary tree, which gives a uniform O(log n) complexity for compromise recovery for an n-member group. In this paper, we study improving the performance of LKH-based key distribution protocols by organizing the LKH tree with respect to the members’ rekeying probabilities instead of keeping a uniform balanced tree. We propose two algorithms which combine ideas from data compression with the special requirements of multicast key management. Simulation results show that these algorithms can reduce the cost of multicast key management significantly, depending on the variation of rekey characteristics among group members.

This research was supported in part by the Department of Defense at the Maryland Center for Telecommunications Research, University of Maryland Baltimore County. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Department of Defense or the U.S. Government

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Almeroth and M. Ammar. Collection and modeling of the join/leave behavior of multicast group members in the mbone. In High Performance Distributed Computing Focus Workshop (HPDC’96), August 1996.

    Google Scholar 

  2. K. Almeroth and M. Ammar. Multicast group behavior in the internet’s multicast backbone (mbone). IEEE Communications, 35(6), June 1997.

    Google Scholar 

  3. A. Ballardie. Scalable multicast key distribution, May 1996. Internet RFC 1949.

    Google Scholar 

  4. T. C. Bell, J. G. Cleary, and I. H. Witten. Text Compression. Prentice-Hall, 1990.

    Google Scholar 

  5. M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Alfredo De Santis, editor, Advances in Cryptology-Eurocrypt’94, pages 275–286. Springer-Verlag, 1994.

    Google Scholar 

  6. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Infocomm’99 Conference, 1999.

    Google Scholar 

  7. A. Fiat and M. Naor. Broadcast encryption. In Douglas R. Stinson, editor, Advances in Cryptology-CRYPTO’ 93, pages 480–491. Springer-Verlag, 1993.

    Google Scholar 

  8. T. Hardjono, B. Cain, and N. Doraswamy. A framework for group key management for multicast security, February 2000. Internet draft (work in progress).

    Google Scholar 

  9. H. Harney, C. Muckenhirn, and T. Rivers. Group key management protocol specification, July 1997. Internet RFC 2093.

    Google Scholar 

  10. D. E. Knuth. Dynamic Huffman coding. Journal of Algorithms, 6:163–180, 1985.

    Article  MATH  MathSciNet  Google Scholar 

  11. A. M. Law and W. D. Kelton. Simulation Modeling and Analysis. McGraw-Hill, 3rd edition, 2000.

    Google Scholar 

  12. M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Advances in Cryptology-EUROCRYPT’ 93. Springer-Verlag, 1998.

    Google Scholar 

  13. D. A. McGrew and A. T. Sherman. Key establishment in large dynamic groups using one-way function trees. Technical Report 0755, TIS Labs, May 1998. A revised version to appear in the IEEE Transactions on Software Engineering.

    Google Scholar 

  14. S. Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM’97 Conference, September 1997.

    Google Scholar 

  15. R. Poovendran and J. S. Baras. An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. In Advances in Cryptology-Crypto’99. Springer-Verlag, 1999.

    Google Scholar 

  16. S. Saeednia and R. Safavi-Naini. Efficient identity-based conference key distribution protocols. In Proceedings of Information Security and Privacy Conference, ACISP’98. Springer-Verlag, 1998.

    Google Scholar 

  17. M. Steiner, G. Tsudik, and M. Waidner. CLIQUES: A new approach to group key agreement. In International Conference on Distributed Computing Systems, pages 380–387. IEEE Computer Society, 1998.

    Google Scholar 

  18. D. Wallner, E. Harder, and R. Agee. Key management for multicast: Issues and architectures, July 1997. Internet draft (work in progress).

    Google Scholar 

  19. C. K. Wong, M. Gouda, and S. S. Lam. Secure group communication using key graphs. In Proceedings of the ACM SIGCOMM’98 Conference, September 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aydin Selçuk, A., Sidhu, D. (2000). Probabilistic Methods in Multicast Key Management. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-44456-4_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41416-2

  • Online ISBN: 978-3-540-44456-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics