Multicast routing in datagram internetworks and extended LANs
ACM Transactions on Computer Systems (TOCS)
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
Optimizing deletion cost for secure multicast key management
Theoretical Computer Science
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
License protection with a tamper-resistant token
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hardware security platform for multicast communications
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
Many secure group communication systems rely on a group key, which is a secret shared among the members of the group. Secure messages are sent to the group by encrypting them with the group key. Because group membership is dynamic, it becomes necessary to change the group key in an efficient and secure fashion when members join or leave the group. We present a series of algorithms for solving this problem based on 2--3 trees, where each internal node has degree 2 or 3. The algorithms attempt to minimize the worst case communication cost of updating the group key and the auxiliary keys needed by the algorithms. The algorithms are analyzed for the worst case performance and evaluated empirically via simulations. We focus on the trade-off between the communication cost due to the structure of the tree and that due to the restructuring of the tree to maintain its structure.