Efficient re-keying protocols for multicast encryption

  • Authors:
  • Giovanni Di Crescenzo;Olga Kornievskaia

  • Affiliations:
  • Telcordia Technologies, Morristown, NJ;CITI, University of Michigan, MI

  • Venue:
  • SCN'02 Proceedings of the 3rd international conference on Security in communication networks
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Never halting growth of the Internet has influenced the development and use of multicast communication which is proving to be an effective method for delivery of data to multiple recipients. Vast number of applications come to benefit from this efficient means of communication. With existing security threats in the Internet it has become imperative to look into multicast security. One of the challenges in securing multicast communication is to efficiently establish and manage shared keys in large and dynamic groups. In this paper we propose very efficient re-keying protocols for multicast encryption. One of our protocols has complexity at most logarithmic in all measures considered in the literature, namely, communication, number of keys stored by the user and by the center, and time complexity per update. We then analyze the performance of the family of tree-based re-keying protocols for multicast encryption, with respect to a set of multiple update operations, and show that for a particular class of such updates, we can modify these schemes so that they guarantee essentially optimal performance. Specifically, while performing m update operations each one at a time would guarantee a complexity of O(mlog n), we show that for a specific (but large) class of instances, we can modify the schemes so that they guarantee O(log n) communication complexity only, by keeping the user storage complexity O(log n), n being the maximum size of the multicast group.