https://scholars.lib.ntu.edu.tw/handle/123456789/352525
Title: | Secure and Efficient Group Key Management with Shared Key Derivation | Authors: | J. C. Lin, K. H. Huang, H. C. Lee, FEI-PEI LAI |
Keywords: | Group key management; Key tree; Secure group communication; Shared key derivation | Issue Date: | Jan-2009 | Journal Volume: | 31 | Journal Issue: | 1 | Start page/Pages: | 192-208 | Source: | The Journal of Computer Standards & Interfaces | Abstract: | In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. In this paper, a new group key management protocol is proposed to reduce the communication and computation overhead of group key rekeying caused by membership changes. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The proposed protocol is shown to be secure and immune to collusion attacks, and it outperforms the other comparable protocols from our analysis and simulation. The protocol is particularly efficient with binary key trees and asynchronous rekeying, and it can be tuned to meet different rekeying delay or key size requirements. © 2007 Elsevier B.V. All rights reserved. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-54349088694&doi=10.1016%2fj.csi.2007.11.005&partnerID=40&md5=30447a4595630c79b0bcc62878ec0941 | DOI: | 10.1016/j.csi.2007.11.005 | SDG/Keyword: | Binary trees; Computer networks; Internet protocols; Multicasting; Network protocols; Sensor networks; Telecommunication; Videotex; Wireless telecommunication systems; Asynchronous; Batch updates; Collusion attacks; Computation overheads; Distant learnings; Efficient; Group key management; Group key management protocols; Group key managements; Group keys; Information transmitted; Key sizes; Key tree; Key trees; Multicast communications; Multicasts; Multiple users; Network applications; Online gamings; Rekeying; Secret keys; Secure group communication; Shared key derivation; To many; Webcasting; Public key cryptography |
Appears in Collections: | 生醫電子與資訊學研究所 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.