Abstract
Many group key management approaches have been recently proposed for providing scalable group rekeying to support secure communications for large and dynamic groups. We give an overview of these approaches and show the research trends. Finally, we discuss some new research directions on this subject.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Banerjee, S., Bhattacharjee, B.: Scalable Secure Group Communication over IP Multicast. In: International Conference on Network Protocols (ICNP) 2001, Riverside, California (November 2001)
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (August 2000) (work in progress)
Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 301–320. Springer, Heidelberg (1999)
Chen, W., Dondeti, L.: Performance comparison of stateful and stateless group rekeying algorithms. In: Proc. of Fourth International Workshopon Networked Group Communication, NGC 2002 (2002)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proc. of IEEE INFOCOM 1999 (March 1999)
Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report No. 00010 (2000)
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Proc. of Advances in Cryptology - CRYPTO 2002 (2002)
Mcauley, A.: Reliable Broadband Communications Using a Burst Erasure Correcting Code. In: Proc. of ACM SIGCOMM 1990, Philadelphia, PA (September 1990)
Moyer, M., Rao, J., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast. Internet Draft, draft-irtf-smug-key-tree-balance-00.txt (June 1999)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Perrig, A., Song, D., Tygar, D.: ELK, a new protocol for efficient large-group key distribution. In: Proc. of the IEEE Symposium on Security and Privacy 2001, Oakland, CA (May 2001)
Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2000)
Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self- Healing Key Distribution with Revocation. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)
Selcuk, A., McCubbin, C., Sidhu, D.: Probabilistic Optimization of LKH-based Multicast Key Distribution Schemes. Draft-selcuk-probabilistic-lkh-01.txt, Internet Draft (January 2000)
Setia, S., Zhu, S., Jajodia, S.: A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. Performance Evaluation 49(1/4), 21–41 (2002)
Wong, C., Gouda, M., Lam, S.: Secure GroupC ommunication Using Key Graphs. In: Proc. of SIGCOMM 1998, Vancouver, British Columbia, pp. 68–79 (1998)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. Internet Draft, draft-wallner-key-arch-01.txt (September 1998)
Yang, Y., Li, X., Zhang, X., Lam, S.: Reliable groupre keying: Design and Performance Analysis. In: Proc. of ACM SIGCOMM 2001, San Diego, CA, USA, pp. 27–38 (August 2001)
Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes. In: Proc. of the 23rd IEEE ICDCS 2003, Providence, RI (May 2003)
Zhu, S., Setia, S., Jajodia, S.: Adding Reliable and Self-Healing Key Distribution to the Subset Difference GroupRe keying Method for Secure Multicast. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds.) NGC 2003 and ICQT 2003. LNCS, vol. 2816, pp. 107–118. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, S., Jajodia, S. (2003). Scalable Group Rekeying for Secure Multicast: A Survey. In: Das, S.R., Das, S.K. (eds) Distributed Computing - IWDC 2003. IWDC 2003. Lecture Notes in Computer Science, vol 2918. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24604-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-24604-6_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20745-0
Online ISBN: 978-3-540-24604-6
eBook Packages: Springer Book Archive