Key Management for Secure Multicast Communications (original) (raw)
Abstract
Providing key management schemes for large scale multicast groups has become an important problem due to many potential commercial applications such as stock quote and software distribution on the Internet. For secure multicast communication, all the group members have to share a common session key.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (38)
- T. Cover, J. Thomas, Elements of Information Theory, John Wiley & Sons, Inc, NY, 1991.
- M. steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution ex- tended to group communication", 3rd ACM Conf. on Computer and Com- munications Security", 1996.
- A. Fiat and M. Naor, "Broadcast Encryption", Advances in Cryptology- Crypto'92, Lecture Notes in Computer Science. vol. 773, pp. 481-491, Springer-Verlag, Berlin Germany, 1993.
- D. R. Stinson, and T. V. Trung, "Some New Results on Key Distribution Patterns and Broadcast Encryption", to appear in Design, Codes and Cryp- tography.
- D. R. Stinson, "On some methods for unconditionally secure key distribution and broadcast encryption", to appear in Design, Codes and Cryptography.
- M. Brumester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System", Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science. vol. 950, pp. 275-286, Springer-Verlag, Berlin Germany, 1994.
- H. Harney and C. Muckenhirn, "GKMP Architecture", Request for Com- ments(RFC) 2093, July 1997.
- H. Harney and C. Muckenhirn. "GKMP Specification". Internet RFC 2094, July 1997.
- S. Mittra, "Iolus: A framework for Scalable Secure Multicasting", In Pro- ceedings of ACM SIGGCOM'97, pages 277-288, September 1997.
- D. M. Wallner, E. C. Harder, and R. C. Agee, "Key Management for Mul- ticast: Issues and Architectures", Internet Draft, September 1998.
- C. K. Wong, M. Gouda, S. S. Lam,"Secure Group Communications Using Key Graphs", In Proceedings of ACM SIGCOMM'98, September 2-4, Van- couver, Canada.
- R. Canetti, and B. Pinkas, "A taxonomy of multicast security issues", In- ternet draft, April, 1999.
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, "Multicast Security: A Taxonomy and Efficient Reconstructions", in Proceedings of IEEE Infocom'99.
- D. A. McGrew and A. Sherman, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees", Manuscript, 1998.
- G. Caronni, M. Waldvogel, D. Sun, and B. Plattner, "Efficient Security for Large and Dynamic Groups", In Proc. of the Seventh Workshop on Enabling Technologies, IEEE Computer Society Press, 1998.
- R. Canetti, T. Malkin, and K. Nissim, "Efficient Communication-Storage Tradeoffs for Multicast Encryption", In Eurocrypt 99, pp. 456 -470.
- I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, "Key Manage- ment for Secure Internet Multicast Using Boolean Function Minimization Techniques", in Proceedings of IEEE Infocom'99.
- R. Canetti, P-C. Cheng, D. Pendarakis, J. R. Rao, P. Rohatgi, D. Saha, "An Architecture for Secure Internet Multicast", Internet Draft, November 1998.
- B. Quinn, "IP Multicast Applications: Challenges and Solutions", Internet draft, November 1998.
- R. Poovendran, and J. S. Baras, "An Information Theoretic Approach for Design and Analysis of Rooted-Tree Based Multicast Key Management Schemes", Springer Verlag Lecture Notes in Computer Sciences, Advances in Cryptology-CRYPTO'99, August 1999, Santa Barbara, USA.
- R. Poovendran, and J. S. Baras, "An Information Theoretic Approach to Multicast Key Management", in Proceedings of IEEE Information theory and Networking Workshop, Metsovo, Greece, June, 1999.
- R. Poovendran, S. Ahmed, S. Corson, J. Baras, "A Scalable Extension of Group Key Management Protocol", Proceedings of ATIRP Conference, pp 187-191, Feb, 1998, Maryland.
- R. Poovendran, S. Corson, J. Baras, "A Dynamic Group ElGamal key Gen- eration with Tight Binding", Proceedings of ATIRP Conference, Feb, 1999, Maryland.
- R. Poovendran, S. Corson, J. Baras, "A Private Scheme for Distributed Shared Key Generation", Proceedings of the Information Theory Workshop, June 1999, South Africa.
- R. Poovendran, S. Corson, J. Baras, "A Shared Key Generation Procedure Using Fractional Keys", Proceedings of the IEEE Milcom, October, 1998, Boston, MA.
- D. Boneh and M. Franklin, "Efficient Generation of Shard RSA Keys", Crypto'98.
- M. Yung, "Cryptovirology: Extortion-Based Security Threats and Counter- measures", Proceedings of IEEE Symposium on Security and Privacy, pp. 129-140, 1995.
- J. L. Massey, "An Information-Theoretic Approach to Algorithms", Impact of Processing Techniques in Communications, In NATO Advanced Study Institutes Series E91, pp. 3-20, 1985.
- J. L. Massey, "Some Applications of Source Coding to Cryptography", In European Trans. on Telecom., Vol. 5, pp. 421-429, July-August 1994.
- H. N. Jendal, Y. J. B. Khun, and J. L. Massey, "An Information-Theoretic Approach to Homomorphic Substitution", In Advances in Cryptology- Eurocrypt'89, LNCS-434, pp. 382-394, 1990.
- Y. Desmedt, Y. Frankel, and M. Yung, " Multi-receiver/Multi-sender net- work security: efficient authenticated multicast feedback", IEEE Infocom'92, pp. 2045-2054.
- A. Menezes, P. van Oorschot, and A. Vanstone, "Handbook of Applied Cryptography", CRC Press, Boca Raton, 1997.
- M. Naor and O. Reingold, "From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs", Advances in Cryptology-Crypto'98, Lecture Notes in Computer Science. vol. 1462, pp. 267-282, Springer-Verlag, Berlin Germany, 1998.
- M. Luby, Pseudo-Random Functions and Applications, Princeton University Press, 1996.
- T. Hardjono, B. Cain, and N. Doraswamy, "A Framework for Group Key Management for Multicast Security", Internet draft, July 1998.
- A. Ballardie. "Scalable Multicast Key Distribution". Internet RFC 1949, May 1996.
- N. Koblitz, Algebraic Aspects of Cryptography, pp. 11-12, Springer-Verlag, New York, 1998.
- N. Koblitz,"Cryptography as a teaching tool", In Cryptologia, October, 1998.