A Lightweight Prepositioned Secret Sharing Tree for Multicast Key Management
نویسندگان
چکیده
Secure group communications are increasingly used in the continuous growth of the Internet applications. In a secure multicast environment, an identical data can be efficiently delivered from a source to multiple receivers within a dynamic group. A simple solution is to encrypt the transmitted data using a symmetric key. However, scalable group rekeying is the main challenge for large and dynamic groups. The key tree-based scheme is widely used to achieve logarithmic computational and transmitted costs in the rekeying process. Nevertheless, the key tree-based schemes use the fixed secret key to encrypt confidential messages until every membership changes, which is lack of security in protecting the high-value content. On the other hand, the key tree-based scheme may result in difficult problems in maintaining synchronization due to the interdependencies among rekeying messages. In this paper, we shall propose a key management scheme based on the secret sharing, in which we apply a new lightweight prepositioned secret sharing tree-based scheme to solve the problem in the key tree-based scheme. Furthermore, we eliminate the encryption/decryption processes during every membership and periodic key changes which can dynamically change the secret key frequently.
منابع مشابه
Protection of multicast scalable video by secret sharing: simulation results
Security is an increasingly important attribute for multimedia applications that require prevention of unauthorized access to copyrighted data. Two approaches have been used to protect scalable video content in distribution: Partial encryption and progressive encryption. Partial encryption provides protection for only selected portions of the video. Progressive encryption allows transcoding wit...
متن کاملA Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in wireless networks. Moving users onto the key tree causes extra key management resources even though they are still in s...
متن کاملDesign of certification authority using secret redistribution and multicast routing in wireless mesh networks
Wireless mesh networks (WMNs) should provide authentication and key management without a trusted third party because of their self-organizing and self-configuring characteristics. Several solutions to this problem have been proposed in mobile ad hoc networks (MANETs). But they are not optimal for WMNs because WMNs are with stationary mesh routers (MRs) that do not suffer from the limited power ...
متن کاملMultilayer multicast key management with threshold cryptography
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yie...
متن کاملDesign and Performance Analysis of Scalable and Efficient Group Key Management Scheme [SEGKMS] for Group Communication in Multicast Networks
Key management plays a very important role in the data communications environment. Problem The lack of security services, communication overhead, computation overhead, etc enables us to concentrate on creating new innovative ideas. A key distribution algorithm in the reviewed protocols doesn’t provide much security in group communication networks. Proposed SEGKMS proposes variable length user i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010