Article

Centralized and Decentralized Group Key Management

ABSTRACT Group communication has been widely deployed. To trans-mit data securely in a dynamic group we need have a secure and efficient group key management protocol. In this paper we first give an overview of centralized and decentralized group key management protocols, after that we proposed our own protocols: Fast Chinese Remaindering Group Key Protocol (FCRGK) and Hierarchical Chinese Remaindering Group Key Protocol (HCRGK). The FCRGK protocol is de-signed for moderate size group key management while the HCRGK protocol is designed for large groups. Both of our protocols have minimal group user side computation and storage requirement with a reasonable increase of computa-tion on the server (and group controllers for HCRGK).

2 Bookmarks
 · 
246 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Group key agreement (GKA) is a fundamental building block for securing peer group communication systems (GCS). Several group key agreement protocols were proposed in the past, all assuming an underlying group communication infrastructure. This paper presents a performance evaluation of 5 notable GKA protocols integrated with a reliable group communication system (Spread). They are: centralized group key distribution (CKD), Burmester-Desmedt (BD), Steer et al. (STR), group Diffie-Hellman GDH) and tree-based group Diffie-Hellman (TGDH).. We present concrete results obtained in experiments on local- and wide-area networks. Our analysis of these results offers insights into their relative scalability and practicality.
    Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on; 02/2002
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. This approach can be regarded as a `midpoint' between traditional message authentication codes and digital signatures. We also present an improved solution to the key revocation problem
    INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 04/1999
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Group key management is an important func-tional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria.
    Information Technology - IT. 01/2005;

Full-text

View
4 Downloads
Available from