Key management approaches to offer data confidentiality for secure multicast

被引:36
作者
Chan, KC [1 ]
Chan, SHG [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
来源
IEEE NETWORK | 2003年 / 17卷 / 05期
关键词
D O I
10.1109/MNET.2003.1233915
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multicasting is an efficient way to deliver data to large of users in applications such as Internet stock quotes, audio and music delivery, file and video distribution, etc. Many of these applications. require the security feature of data confidentiality, which is not readily offered by the "open" nature of multicast. In order to offer such confidentiality, the encryption and decryption keys must be constantly changed upon a membership change. In this article, after discussing some performance criteria to offer secure multicast, we present a number of the proposed key management schemes for data confidentiality. We categorize these schemes into four groups: key tree-based approaches, contributory key agreement schemes supported by the Diffie-Hellman algorithm, computational number theoretic approaches, and secure multicast framework approaches. Through examples, we describe the operation of the schemes and compare their performances.
引用
收藏
页码:30 / 39
页数:10
相关论文
共 34 条
[1]   Key management for restricted multicast using broadcast encryption [J].
Abdalla, M ;
Shavitt, Y ;
Wool, A .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (04) :443-454
[2]  
[Anonymous], P ACM SIGCOM SAN FRA
[3]  
[Anonymous], P 5 ACM C COMP COMM
[4]   New multiparty authentication services and key agreement protocols [J].
Ateniese, G ;
Steiner, M ;
Tsudik, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :628-639
[5]  
BALENSON D, 1999, KEY ESTABLISHMENT LA
[6]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[7]  
BURMESTER M, 1995, P ADV CRYPT EUR 94, P275
[8]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[9]  
Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P459
[10]  
CHAN KC, 2002, IEEE JSAC, V20