Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The LSD Broadcast Encryption Scheme
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient multicast key management for stateless receivers
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient re-keying protocols for multicast encryption
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The problem of secure multicasting in a large and highly dynamical group of users is addressed, and a novel hierarchical key management framework is proposed, based on an appropriate combination of the updatable and static logical key hierarchies. It fits to the underlying architecture of an IP-based network, and reduces the synchronization problem which is a main issue regarding the necessary key update upon membership changes. The proposed solution employs a hybrid two-layer approach with the updatable key hierarchy in the upper layer and the static one in the bottom layer. It provides scalability, flexibility, efficiency and security. Although any static and updatable logical hierarchies can be employed, certain architectural issues of the proposed framework are considered. The security and performance of the proposed approaches are discussed and compared with the previously reported schemes, and advantages of the proposed approach are pointed out.