Multicast routing in datagram internetworks and extended LANs
ACM Transactions on Computer Systems (TOCS)
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Proxy Encryptions for Secure Multicast Key Management
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
Conversion and Proxy Functions for Symmetric Key Ciphers
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Usable secure mailing lists with untrusted servers
Proceedings of the 8th Symposium on Identity and Trust on the Internet
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Scalable and efficient approach for secure group communication
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
Hi-index | 0.00 |
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” shared by all group members. However, this incurs the so-called “1 affects n problem,” that is, an action of one member affects the whole group. We believe this is the source of scalability problems. Moreover, from the administrative perspective, it is desired to confine the impacts of changing membership events in a local area. In this paper, we propose a new secure multicast architecture without using a group key. We exploit a cryptographic primitive “proxy encryption.” It allows routers to convert a ciphertext encrypted under a key to a ciphertext encrypted under another key, without revealing the secret key and the plaintext. By giving proper keys to intermediate routers, routers could provide separation between subgroups. Therefore the goals of scalability and containment are achieved.