Eecient Communication-storage Tradeoos for Multicast Encryption
نویسندگان
چکیده
We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of diierent scenarios using multicast, presenting a wide range of eeciency requirements with respect to several parameters. We give an upper bound on the tradeoo between storage and communication parameters. In particular , we suggest an improvement of the schemes by Wallner et al. and Wong et al. 13, 14] with sub-linear center storage, without a signiicant loss in other parameters. Correctly selecting the parameters of our scheme we can eeciently accommodate a wide range of scenarios. This is demonstrated by Applying the protocol to some known benchmark scenarios. We also show lower bounds on the tradeoo between communication and user storage, and show that our scheme is almost optimal with respect to these lower bounds.
منابع مشابه
Computationally effecient group re-keying for time sensitive applications
Key distribution is an important problem for secure group communications. Multicast is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of mu...
متن کاملA Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks
–Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast key distribution problem has been studied extensively. We impl...
متن کاملEfficient Communication-Storage Tradeoffs for Multicast Encryption
We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of different scenarios using multicast, presenting a wide range of efficiency requirements with respect to several parameters. We give an upper bound on the tradeoff between storage and communication parameters. In particular, we suggest an improvement of the schemes by Wallner...
متن کاملDegree-Constrained Multicasting in Point-to-Point Networks
Establishing a multicast tree in a point-to-point network of switch nodes, such as a wide-area ATM network, is often modeled as the NP-complete Steiner problem in networks. In this paper, we study algorithms for nding eecient multi-cast trees in the presence of constraints on the copying ability of the individual switch nodes in the network. We refer to this problem as the degree-constrained mu...
متن کاملImproving Revocation Scheme to Enhance the Performance in Multi-Authority ABE
Traditional system in cryptography allows just sharing of keys between the sender and receiver, for such a technique only the signature storage is provided for the user’s public key. But as the number of users increases, it’s became a challenging job to have such a certificate storage as well as key distribution, to overcome this Identity Based Encryption (IBE) was proposed, but again it had cr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007