Hierarchies of keys in secure multicast communications
نویسندگان
چکیده
This work considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. We also introduce the concepts of information lifetime and of information dependence to formalize the intuition that keys should be longer, and thus stronger, when used to encrypt “important” information, that is information (including other keys) that need to be kept confidential for a longer period. Then, these concepts are used to build a formal theory that is applied to set the correct bit length of every key in the system in such a way to guarantee the prescribed degree of confidentiality of the multicast messages. Quite surprisingly, we formally show that not all the keys in the LKH hierarchy should have the same length; this observation, besides being of theoretical interest, also leads to substantial savings in terms of memory, computation, and bandwidth. The theory we develop to obtain these results can be useful in other contexts as well.
منابع مشابه
A comparative performance analysis of reliable group rekey transport protocols for secure multicast
Scalable group rekeying is one of the important problems that needs to be addressed in order to support secure multicast communications for large and dynamic groups. One of the challenging issues that arises in scalable group rekeying is the problem of delivering the updated keys to the members of the group in a reliable and timely manner. In this paper, we present a new scalable and reliable k...
متن کاملAnti-Jamming Frequency Hopping Techniques for Secure Multicast Communications
We address the problem of jamming mitigation of multicast communications in multi-channel ad hoc networks. Specifically, we develop two frequency hopping (FH) techniques for establishing multicast communications. These techniques, denoted by KFH and CFH, address the two following problems. First, establishing multicast communications in the presence of a control-channel jamming attack. Second, ...
متن کاملA New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and hierarchical binary trees. This will reduce the number of transmissions at the joins/leaves of participants. Also, we explain a naming method, which allows to facilitate the understanding of the hierarchical binary tr...
متن کاملEnhancement of Hierarchical Key Management Scheme of Secure Multicast Transmission for Overlay Networks
Group communication security is needed to protect sensitive information. A group key is shared by all users under secure group communication model. The group key is used to encrypt data transmitted to the group. The group membership is dynamic and requires new key for membership changes. Secure multicast transmission schemes are used to transfer data to a set of nodes. Membership in secure mult...
متن کاملEfficient Key Management for Secure Group Communications with Bursty Behavior
Secure group communication (SGC) is becoming more popular in the Internet. Burstiness is an important behavior in SGC. Performing bursty operation in one aggregate operation is important for efficiency and scalability. In this paper, we extend the well-known key-tree key management protocol for SGC to situations with bursty user arrival and departure patterns. By using a binary representation t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2010