Abstract
Logical Key Hierarchy is a scalable and efficient method to achieve logarithmic rekeying cost in secure group communication. In applications like pay per view, video conferencing with multiple rekeying operations, the key tree will be unbalanced and will generate worst-case rekeying cost. With each join, leave operation we change the group key as well as update all keys along the key path of join/leave user. Key aspect in secure group communication is maintaining a balanced key tree and achieving logarithmic rekeying cost. In this paper, a new Strict Binary Logical Key Hierarchy rekeying algorithm is proposed. SBLKH (Strict Binary Logical Key Hierarchy) with proposed Join user algorithm and leave user algorithm maintains the balance of tree and always achieves logarithmic rekeying cost. Our experimental result shows the achieved improvement in rekeying cost of SBLKH join and leave operations compared to original LKH (Logical Key Hierarchy) join and leave operations. Rekeying cost of LKH join/leave is O(log N) and proposed SBLKH join/leave algorithm cost is O(log d), where d is the depth of tree and N is the number of users.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sakamoto, T., Tsuji, T., Kaji, Y.: Group key rekeying using the LKH technique and the Huffman algorithm. In: 2008 International Symposium on Information Theory and its Applications (2008)
Lu, H.: A novel high-order tree for secure multicast key management. IEEE Trans. Comput. 2 (2005)
Pande, A.S., Joshi, Y.V., Joshi, M.Y.: Analysis on logical key hierarchy and variants for secure group communication. In: ICCASP 2018, Book chapter, Springer-Atalntis, AISR, ISSN 1951-6851
Wong, C.K., Gauda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)
Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math Appl. 65, 1360–1368 (2013)
Chou, K.-Y., Chen, Y.-R., Tzeng, W.-G.: An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems. In: 2011 13th Asia Pacific Network Operations and Management Symposium (2011)
Zhao, S., Kent, R., Aggarwal, A.: A key management and secure routing integrated framework for ad-hoc networks. Ad-Hoc Netw. (Elsevier) 11, 1046–1061 (2013)
Hanatani, Y., et al.: Secure multicast group management and key distribution in IEEE 802.21. In: Security Standardisation Research, pp. 227–243. Springer International Publishing (2016)
Zhou, H., Zheng, M., Wang, T.: A novel group key scheme for MANETS. Advanced in Control Engineering and Information Science. Proced. Eng. (IJSIA) 3388–3395 (2011)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. IETF, RFC 2627 (1999)
Hafizul Islam, S.K., Biswas, G.P.: A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J. King Saud Univ. Comput. Inf. Sci. 29(1), 63–73 (2017)
Kumar, V., Kumar, R., Pandey, S.K.: A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. J. King Saud Univ. Comput. Inf. Sci. (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pande, A.S., Joshi, Y.V., Joshi, M.Y. (2020). Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication. In: Iyer, B., Deshpande, P., Sharma, S., Shiurkar, U. (eds) Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol 1025. Springer, Singapore. https://doi.org/10.1007/978-981-32-9515-5_23
Download citation
DOI: https://doi.org/10.1007/978-981-32-9515-5_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9514-8
Online ISBN: 978-981-32-9515-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)