An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
نویسندگان
چکیده
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by assigning probabilities for member revocations, the optimality, correctness, and the system requirements of some of these schemes [18, 19, 20, 21] can be systematically studied using information theoretic concepts. Specifically, we show that the optimal average number of keys per member in a rooted tree is related to the entropy of the member revocation event. Using our derivations we show that (a) the key assignments in [18, 21, 20, 19] correspond to the maximum entropy solution, (b) and direct application of source coding will lead to member collusion (we present recently proposed solutions [21, 20] as examples of this) and a general criteria that admits member collusion. We also show the relationship between entropy of member revocation event and key length.
منابع مشابه
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
Recent literature presents several rooted tree based member deletion/revocation schemes [20, 21, 22, 24, 4, 5] trying to simultaneously minimize the key storage while providing e cient member deletion/revocation. Many of these approaches have di erent solutions and provide di erent values for the number of keys to be stored and distributed. In this paper, we show that many of these papers can b...
متن کاملComparison of Scalable Key Distribution Schemes for Secure Group Communication
Scalable secure key distribution is the most important feature of a scalable secure group communication protocol. Most of the existing scalable secure group communication protocols are based on a hierarchical key distribution tree. These schemes can be classified as hierarchical node based schemes and hierarchical key based schemes. In this paper; we compare recently proposed hierarchical key d...
متن کاملPerformance Optimizations for Group Key Management Schemes for Secure Multicast
Scalable group rekeying is one of the biggest challenges that need to be addressed to support secure communications for large and dynamic groups. In recent years, many group key management approaches based on the use of logical key trees have been proposed to address this issue. Using logical key trees reduces the complexity of group rekeying operation from O(N) to O(logN), where N is the group...
متن کاملOptimal Multicast Group Communication
Many IP multicast based applications, such as PayTV, Multiplayer games, require controlling the group memberships of senders and receivers. One common solution is to encrypt the data with a session key shared with all authorized senders/receivers. To efficiently update the session key in the event of member removal, many rooted-tree based group key distribution schemes have been proposed. Howev...
متن کاملMultilayer multicast key management with threshold cryptography
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999