Minimizing center key storage in hybrid one-way function based group key management with communication constraints
نویسندگان
چکیده
We study the problem of designing a storage efficient secure multicast key management scheme based on one-way function trees (OFT) for a prespecified key update communication overhead. Canetti, Malkin and Nissim presented a hybrid model that divides a group of N members into clusters of M members and assigns each cluster to one leaf node of a key tree. Using the model, we formulate a constrained optimization problem to minimize the center storage in terms of the cluster size M . Due to the monotonicity of the center storage with respect to M , we convert the constrained optimization into a fixed point equation and derive the optimal M∗ explicitly. We show that the asymptotic value of the optimal M∗, given as μ+ a−1 loge a loge μ with μ= O(logN) and a being the degree of a key tree, leads to the minimal storage as O( N logN ), when the update communication constraint is given as O(logN). We present an explicit design algorithm that achieves minimal center storage for a given update communication constraint. 2004 Elsevier B.V. All rights reserved.
منابع مشابه
Sender Key Storage Reduction of Secure Multicast Key Management Schemes Using One-Way Function Tree
Developing scalable infrastructure services for secure multicast communications has been an active research area [1]-[10]. One-way function tree (OFT) [1, 6] is a secure multicast key distribution scheme with logarithmic key update communication overhead in group size N . The OFT scheme has been proposed as a candidate for secure multicast over Internet to the IETF under Multicast Security (MSE...
متن کاملStorage-Efficient Stateless Group Key Revocation
Secure group communication relies on secure and robust distribution of group keys. A stateless group key distribution scheme is an ideal candidate when the communication channel is unreliable. Several stateless group key distribution schemes have been proposed. However, these schemes require all users store a certain number of auxiliary keys. The number of such keys increases as the group size ...
متن کاملOptimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
We study a method for key predistribution in a network of n users where pairwise keys are computed by hashing users’ IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph G can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of thi...
متن کاملAnalysis of Key Management Schemes for Secure Group Communication and Their Classification
Secure Group Communication is very critical for applications like board-meetings, group discussions and teleconferencing. Managing a set of secure group keys and group dynamics are the fundamental building blocks for secure group communication systems. Several group key management techniques have been proposed so far by many researchers. Some schemes are information theoretic and some are compl...
متن کاملSecurity and Efficiency Tradeoffs in Multicast Group Key Management
An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. In this thesis we study the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Process. Lett.
دوره 93 شماره
صفحات -
تاریخ انتشار 2005