Secure group communications using key graphs

被引:116
作者
Wong, CK [1 ]
Gouda, M [1 ]
Lam, SS [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Austin, TX 78712 USA
关键词
confidentiality; group communications; group key management; key distribution; multicast; privacy; rekeying; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many emerging network applications (e.g., teleconference, information services, distributed interactive simulation, and collaborative work) are based upon a group communications model. As a result, securing group communications, i.e., providing confidentiality, authenticity, and integrity of messages delivered between group members, will become a critical networking issue. We present, in this paper, a novel solution to the scalability problem of group/multicast key management. We formalize the notion of a secure group as a triple (U, K, R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave and specify protocols for joining and leaving a secure group. The rekeying: strategies and join/leave protocols are implemented in a prototype key server we have built. We present measurement results from experiments and discuss performance comparisons. We show that our group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves. In particular, the average measured processing time per join/leave increases linearly with the logarithm of group size.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 27 条
[1]  
[Anonymous], 1989, INTRO ALGORITHMS
[2]  
BALLARDIE T, 1995, P S NETW DISTR SYST
[3]  
Ballardie T, 1996, 1949 RFC
[4]  
BERKOVITS S, 1991, LECT NOTES COMPUT SC, V547, P535
[5]   THE KRYPTOKNIGHT FAMILY OF LIGHTWEIGHT PROTOCOLS FOR AUTHENTICATION AND KEY DISTRIBUTION [J].
BIRD, R ;
GOPAL, I ;
HERZBERG, A ;
JANSON, P ;
KUTTEN, S ;
MOLVA, R ;
YUNG, M .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1995, 3 (01) :31-41
[6]   SECURE BROADCASTING USING THE SECURE LOCK [J].
CHIOU, GH ;
CHEN, WT .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (08) :929-930
[7]  
DEERING S, 1988, P ACM SIGCOMM, P55
[8]  
DENG RH, 1995, P IEEE GLOB 95 NOV
[9]  
Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
[10]  
FREIER AO, 1996, UNPUB SSL PROTOCOL V