Eecient Communication-storage Tradeoos for Multicast Encryption

نویسندگان

  • Ran Canetti
  • Tal Malkin
چکیده

We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of diierent scenarios using multicast, presenting a wide range of eeciency requirements with respect to several parameters. We give an upper bound on the tradeoo between storage and communication parameters. In particular , we suggest an improvement of the schemes by Wallner et al. and Wong et al. 13, 14] with sub-linear center storage, without a signiicant loss in other parameters. Correctly selecting the parameters of our scheme we can eeciently accommodate a wide range of scenarios. This is demonstrated by Applying the protocol to some known benchmark scenarios. We also show lower bounds on the tradeoo between communication and user storage, and show that our scheme is almost optimal with respect to these lower bounds.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally effecient group re-keying for time sensitive applications

Key distribution is an important problem for secure group communications. Multicast is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of mu...

متن کامل

A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

–Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast key distribution problem has been studied extensively. We impl...

متن کامل

Efficient Communication-Storage Tradeoffs for Multicast Encryption

We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of different scenarios using multicast, presenting a wide range of efficiency requirements with respect to several parameters. We give an upper bound on the tradeoff between storage and communication parameters. In particular, we suggest an improvement of the schemes by Wallner...

متن کامل

Degree-Constrained Multicasting in Point-to-Point Networks

Establishing a multicast tree in a point-to-point network of switch nodes, such as a wide-area ATM network, is often modeled as the NP-complete Steiner problem in networks. In this paper, we study algorithms for nding eecient multi-cast trees in the presence of constraints on the copying ability of the individual switch nodes in the network. We refer to this problem as the degree-constrained mu...

متن کامل

Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE

Traditional system in cryptography allows just sharing of keys between the sender and receiver, for such a technique only the signature storage is provided for the user’s public key. But as the number of users increases, it’s became a challenging job to have such a certificate storage as well as key distribution, to overcome this Identity Based Encryption (IBE) was proposed, but again it had cr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007