Key management for secure overlay multicast

  • Authors:
  • Jong-Hyuk Roh;Kyoon-Ha Lee

  • Affiliations:
  • Information Security Research Division, ETRI, Korea;Dept. of Computer Science and Engineering, Inha University, Korea

  • Venue:
  • CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM (Key Tree in Overlay Multicast). We described the operations of KTOM and compare the performance with other schemes, namely, host-to-host encryption, whole group encryption and SOT scheme.