Skip to main content

Scalable Group Rekeying for Secure Multicast: A Survey

  • Conference paper
Distributed Computing - IWDC 2003 (IWDC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2918))

Included in the following conference series:

Abstract

Many group key management approaches have been recently proposed for providing scalable group rekeying to support secure communications for large and dynamic groups. We give an overview of these approaches and show the research trends. Finally, we discuss some new research directions on this subject.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Banerjee, S., Bhattacharjee, B.: Scalable Secure Group Communication over IP Multicast. In: International Conference on Network Protocols (ICNP) 2001, Riverside, California (November 2001)

    Google Scholar 

  2. Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (August 2000) (work in progress)

    Google Scholar 

  3. Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 301–320. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Chen, W., Dondeti, L.: Performance comparison of stateful and stateless group rekeying algorithms. In: Proc. of Fourth International Workshopon Networked Group Communication, NGC 2002 (2002)

    Google Scholar 

  5. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proc. of IEEE INFOCOM 1999 (March 1999)

    Google Scholar 

  6. Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report No. 00010 (2000)

    Google Scholar 

  7. Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Proc. of Advances in Cryptology - CRYPTO 2002 (2002)

    Google Scholar 

  8. Mcauley, A.: Reliable Broadband Communications Using a Burst Erasure Correcting Code. In: Proc. of ACM SIGCOMM 1990, Philadelphia, PA (September 1990)

    Google Scholar 

  9. Moyer, M., Rao, J., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast. Internet Draft, draft-irtf-smug-key-tree-balance-00.txt (June 1999)

    Google Scholar 

  10. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Perrig, A., Song, D., Tygar, D.: ELK, a new protocol for efficient large-group key distribution. In: Proc. of the IEEE Symposium on Security and Privacy 2001, Oakland, CA (May 2001)

    Google Scholar 

  12. Setia, S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2000)

    Google Scholar 

  13. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self- Healing Key Distribution with Revocation. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)

    Google Scholar 

  14. Selcuk, A., McCubbin, C., Sidhu, D.: Probabilistic Optimization of LKH-based Multicast Key Distribution Schemes. Draft-selcuk-probabilistic-lkh-01.txt, Internet Draft (January 2000)

    Google Scholar 

  15. Setia, S., Zhu, S., Jajodia, S.: A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. Performance Evaluation 49(1/4), 21–41 (2002)

    Article  MATH  Google Scholar 

  16. Wong, C., Gouda, M., Lam, S.: Secure GroupC ommunication Using Key Graphs. In: Proc. of SIGCOMM 1998, Vancouver, British Columbia, pp. 68–79 (1998)

    Google Scholar 

  17. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. Internet Draft, draft-wallner-key-arch-01.txt (September 1998)

    Google Scholar 

  18. Yang, Y., Li, X., Zhang, X., Lam, S.: Reliable groupre keying: Design and Performance Analysis. In: Proc. of ACM SIGCOMM 2001, San Diego, CA, USA, pp. 27–38 (August 2001)

    Google Scholar 

  19. Zhu, S., Setia, S., Jajodia, S.: Performance Optimizations for Group Key Management Schemes. In: Proc. of the 23rd IEEE ICDCS 2003, Providence, RI (May 2003)

    Google Scholar 

  20. Zhu, S., Setia, S., Jajodia, S.: Adding Reliable and Self-Healing Key Distribution to the Subset Difference GroupRe keying Method for Secure Multicast. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds.) NGC 2003 and ICQT 2003. LNCS, vol. 2816, pp. 107–118. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, S., Jajodia, S. (2003). Scalable Group Rekeying for Secure Multicast: A Survey. In: Das, S.R., Das, S.K. (eds) Distributed Computing - IWDC 2003. IWDC 2003. Lecture Notes in Computer Science, vol 2918. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24604-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24604-6_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20745-0

  • Online ISBN: 978-3-540-24604-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics