Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.6.71

Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme  

Park Chang-Seop (Dankook University)
Lee Gyu-Won (Dankook University)
Abstract
In the near future, various aplications on the Internet will be based on the multicast group communication, so that the efficient group key management is essential for managing the frequent group join and leave events. In this paper, we propose several batch rekeying schemes extended from conventional individual rekeying schemes, and analyze the efficiencies of them in terms of both the number of encryption and one-way hash function as well as multicast message size. Considering multiple member leaves, a probabilistic approach is need to compute the average computational amounts for rekeying.
Keywords
one-way hash function; XOR; ECSM+;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. K. Wong, M. Gouda, and S. S. Lam, 'Secure group communications using key graphs,' In Proceedings of ACM SIGCOMM, 1998
2 R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, 'Multicast Security: A Taxonomy and Efficient Authentication,' In Proc. of IEEE '99, vol.2, pp.708-716, March 1999
3 A. Perrig, D. Song, J.D.Tygar, 'ELK, a New Protocol for Efficient Large-Group Key Distribution,' In 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001
4 Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park, 'Efficient Multicast Key Management for Stateless Receivers,' ICISC 2002: 497-509
5 X. S. Li, Y. R. Yang, M. G. Gouda, S. S. Lam, 'Batch Rekeying for Secure Group Communications,' WWW10, 2001
6 A. T. Sherman and D. A. McGrew, 'Key Establishment in Large Dynamic Groups Using One-Way Function Trees,' IEEE Transactions on software engineering, Vol. 29, 2003
7 S. E. Deering, 'Multicast routing in internetworks and extended LANs,' In Proceedings of ACM SIGCOMM, pp. 55-64, 1988
8 A. T. Sherman and D. A. McGrew, 'Key Establishment in Large Dynamic Groups Using One-Way Function Trees,' Cryptographic Technologies Group TIS Labs at Network Associates, 1998
9 H. Harney and E. Harder, 'Logical key hierarchy protocol,' IETF Internet Draft, 1999
10 D. Wallner E. Harder, and R. Agee, 'Key Management for Multicast : Issues and Architectures,' IETF RFC 2627, 1999
11 S. Rafaeli, L. Mathy, and D. Hutchison, 'EHBT: An efficient protocol for group key management,' Lecture Notes in Computer Science, 2233: 159-171, 2001
12 D. Naor, M. Naor, J. Lotspiech, 'Revocation and Tracing Schemes for Stateless Receivers,' Lecture Notes in Computer Science 2139, pp. 41-62, 2001