Abstract
Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast applications require the receivers to securely send some real-time information back to the source, which leads to a many-to-one communication scenario. Using unicast connections to send this reverse traffic results in a data implosion which may swamp the source with incoming communication. In order to avoid this problem, a method for aggregating the information as it is being sent back to the source is presented in this paper. Confidentiality and authentication are guaranteed at the symbol level for this reverse realtime traffic.
This work has been partly supported by the Spanish Ministry of Science and Technology and the European FEDER fund under project TIC2001–0633-C03–01 “STREAMOBILE”.
Chapter PDF
Similar content being viewed by others
References
R. Johnson, D. Molnar, D. Song and D. Wagner, “Homomorphic signature schemes”, in Topics in Cryptology — CT-RSA 2002, ed. B. Preneel, LNCS 2271, Berlin: Springer Verlag, pp. 244–262, 2002.
R. C. Merkle and M. Hellman, “Hiding information and signatures in trapdoor knapsacks”, in IEEE Transactions on Information Theory, vol. 24, no. 5, pp. 525–530, 1978.
C.K. Miller, Multicast Newtorking and Applications. Reading MA: Addison Wesley, 1999.
Multicast Security Working Group (MSEC WG). http ://www.securemulticast.org
T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring”, in Advances in Cryptology — EUROCRYPT′98, ed. K. Nyberg, LNCS 1403, Berlin: Springer-Verlag, pp. 308–318, 1998.
B. Quinn and K. Almeroth, “IP multicast applications: challenges and solutions”, Internet RFC 3170, Sept. 2001. http://www.ietf.org.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Domingo-Ferrer, J., Martínez-Ballesté, A., Sebé, F. (2004). Secure Reverse Communication in a Multicast Tree. In: Mitrou, N., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds) Networking 2004. NETWORKING 2004. Lecture Notes in Computer Science, vol 3042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24693-0_66
Download citation
DOI: https://doi.org/10.1007/978-3-540-24693-0_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21959-0
Online ISBN: 978-3-540-24693-0
eBook Packages: Springer Book Archive