Secure and Efficient Group Key Management with Shared Key Derivation
Journal
The Journal of Computer Standards & Interfaces
Journal Volume
31
Journal Issue
1
Pages
192-208
Date Issued
2009-01
Author(s)
Abstract
In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. In this paper, a new group key management protocol is proposed to reduce the communication and computation overhead of group key rekeying caused by membership changes. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The proposed protocol is shown to be secure and immune to collusion attacks, and it outperforms the other comparable protocols from our analysis and simulation. The protocol is particularly efficient with binary key trees and asynchronous rekeying, and it can be tuned to meet different rekeying delay or key size requirements. © 2007 Elsevier B.V. All rights reserved.
Subjects
Group key management; Key tree; Secure group communication; Shared key derivation
Other Subjects
Binary trees; Computer networks; Internet protocols; Multicasting; Network protocols; Sensor networks; Telecommunication; Videotex; Wireless telecommunication systems; Asynchronous; Batch updates; Collusion attacks; Computation overheads; Distant learnings; Efficient; Group key management; Group key management protocols; Group key managements; Group keys; Information transmitted; Key sizes; Key tree; Key trees; Multicast communications; Multicasts; Multiple users; Network applications; Online gamings; Rekeying; Secret keys; Secure group communication; Shared key derivation; To many; Webcasting; Public key cryptography
Type
journal article