A Token Based Key Distribution Protocol for Closed Group Meetings

  • Fuwen Liu
  • Hartmut Koenig
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 229)


Many emerging interactive and collaborative applications use the peer-to-peer paradigm nowadays. In every-day life peer-to-peer meetings of small groups are dominant, e.g. for business talks. Confidentiality is of primary concern in this context to provide group privacy. To assure confidentiality the partners have to agree upon a secret group key for encrypting their communication. This requires a secure distributed group key exchange protocol which assures that only active, uniquely authenticated group members know the current session key. In this paper we present a novel distributed key distribution protocol, called TKD, to efficiently support the key renewal in small dynamic peer groups. Performance comparisons show that TKD has a lower key refreshment delay compared to existing key exchange protocols.


Communication Round Secure Group Communication Token Holder Virtual Synchrony Group Communication Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    P. McDaniel, A. Prakash, and P. Honeyman: Antigone: A Flexible Framework for Secure Group Communication, CITI Technical Report 99-2, University of Michigan.Google Scholar
  2. 2.
    P. S. Kruus: A survey of multicast security issues and architectures. In: Proc. of the 21st National Information Systems Security Conference (NISSC), Oct. 1998.Google Scholar
  3. 3.
    S. Rafaeli and D. Hutchison: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35 (2003) 3: 309–329.CrossRefGoogle Scholar
  4. 4.
    H. Harney and C. Muckenhirn: Group Key Management Protocol (GKMP) Specification, July 1997, RFC 2094.Google Scholar
  5. 5.
    C. Wong, M. Gouda, and S. Lam: Secure group communication using key graphs. IEEE/ACM Transactions on Networking 8 (2000)1: 16–30.CrossRefGoogle Scholar
  6. 6.
    M. J. Moyer, J. R. Rao and P. Rohatgi: Maintaining balanced key trees for secure multicast. Technical report, IETF, June 1999. draft-irtf-smug-key-tree-balance-00.txt.Google Scholar
  7. 7.
    Y. Kim, A. Perrig, and G. Tsudik: Tree-based Group Key Agreement. ACM Transactions on Information Systems Security (TISSEC) 7(2004)1: 60–96.CrossRefGoogle Scholar
  8. 8.
    E. Rescorla: Diffie-Hellman Key Agreement Method. RFC 2631, June 1999.Google Scholar
  9. 9.
    M. Burmester and Y. Desmedt: A secure and efficient conference key distribution system. In Advances in Cryptology (EUROCRYPT’94), Springer LNCS 950, 1995, pp. 275–286.Google Scholar
  10. 10.
    M. Steiner, G. Tsudik, and M. Waidner: CLIQUES: A new approach to group key agreement. IEEE ICDCS, 1998, pp. 380–397.Google Scholar
  11. 11.
    Y. Kim, A. Perrig, and G. Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: S. Jajodia (ed.): 7th ACM Conference on Computer and Communications Security, Athens, Greece, Nov. 2000, ACM Press, pp. 235–244.Google Scholar
  12. 12.
    L. Dondeti, S. Mukherjee, and A. Samal: Disec: A distributed framework for scalable secure many-to-many communication. In: Proc. of the 5th IEEE Symposium on Computers and Communications (ISCC), July 2000.Google Scholar
  13. 13.
    O. Rodeh, K. P. Birman, D. Dolev: Optimized Group Rekey for Group Communication Systems. In Symposium Network and Distributed System Security (NDSS), San Diego, California, Feb. 2000, pp. 39–48.Google Scholar
  14. 14.
    G. V. Chockler, I. Keidar, and R. Vitenberg: Group communication specifications: A comprehensive study. ACM Computing Surveys 4 (2001): 427–469.CrossRefGoogle Scholar
  15. 15.
    B. Whetten, T. Montgomery, and S. Kaplan: A High Performance Totally Ordered Multicast Protocol. International Workshop on Theory and Practice in Distributed Systems, Springer LNCS 938, pp. 33–57, 1994.Google Scholar
  16. 16.
    D. A. Agarwal: Totem: A Reliable Ordered Delivery Protocol for Interconnected Local Area Networks, Ph.D Thesis, University of Santa Barbara, Dec 1994.Google Scholar
  17. 17.
    K. Birman, R. Constable, M. Hayden, C. Kreitz, O. Rodeh, R. Van Renesse, W. Vogels: The Horus and Ensemble Projects: Accomplishments and Limitations. In: Proc. of the DARPA Information Survivability Conference & Exposition (DISCEX’ 00), Hilton Head, South Carolina, 2000.Google Scholar
  18. 18.
    Y. Amir, C. Danilov, and J. Stanton: A low latency, loss tolerant architecture and protocol for wide area group communication. In: Proc. 30th IEEE FTCS, June 2000.Google Scholar
  19. 19.
    M. Zuehlke, and H. Koenig: A Signaling Protocol for Small Closed Dynamic Multi-peer Groups. In Z. Mammeri and P. Lorenz (eds.): High Speed Networks and Multimedia Communications (HSNMC 2004). Springer-Verlag, Berlin, Heidelberg 2004, pp. 973–984Google Scholar
  20. 20.
    D. Harkins and D. Carrel: The Internet Key Exchange (IKE), RFC 2409, Nov. 1998.Google Scholar
  21. 21.
    C. Kaufman, Internet Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2-17.txt, September 2004.Google Scholar
  22. 22.
    H. Krawczyk, M. Bellare, and R. Canetti: HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997.Google Scholar
  23. 23.
    Crypto++ 5.2.1 Benchmarks, http://www.eskimo.com/~weidai/benchmarks.html Google Scholar
  24. 24.
    M. Zuehlke: Distributed organized multiparty video conference for closed group in the Internet. Ph.D thesis, Brandenburg University of Technology Cottbus, Department of Computer Science, May 2004.Google Scholar
  25. 25.
    The BRA VIS video conference system, http://www.bravis.tu-cottbus.de. Google Scholar
  26. 26.
    S. Chanson, A. Hui, E. Siu, I. Beier, H. Koenig, and M. Zuehlke: OCTOPUS-A Scalable Global Multiparty Video Conferencing System. In: Proc. of the 8th International IEEE Conference on Computer Communications and Networks (IC3N’99), Boston, 1999, pp.97–102Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Fuwen Liu
    • 1
  • Hartmut Koenig
    • 1
  1. 1.Department of Computer ScienceBrandenburg University of Technology CottbusCottbusGermany

Personalised recommendations