Scalable group key management for secure multicast

A taxonomy and new directions

Sencun Zhu, Sushil Jajodia

Research output: Chapter in Book/Report/Conference proceedingChapter

18 Citations (Scopus)

Abstract

Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.

Original languageEnglish (US)
Title of host publicationNetwork Security
PublisherSpringer US
Pages57-75
Number of pages19
ISBN (Print)9780387738208
DOIs
StatePublished - Dec 1 2010

Fingerprint

Taxonomies
Teleconferencing
Communication
Taxonomy
Secure communication

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems and Management

Cite this

Zhu, Sencun ; Jajodia, Sushil. / Scalable group key management for secure multicast : A taxonomy and new directions. Network Security. Springer US, 2010. pp. 57-75
@inbook{4c533b94836746028d842bd99f0a5b36,
title = "Scalable group key management for secure multicast: A taxonomy and new directions",
abstract = "Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.",
author = "Sencun Zhu and Sushil Jajodia",
year = "2010",
month = "12",
day = "1",
doi = "10.1007/978-0-387-73821-5_3",
language = "English (US)",
isbn = "9780387738208",
pages = "57--75",
booktitle = "Network Security",
publisher = "Springer US",
address = "United States",

}

Scalable group key management for secure multicast : A taxonomy and new directions. / Zhu, Sencun; Jajodia, Sushil.

Network Security. Springer US, 2010. p. 57-75.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Scalable group key management for secure multicast

T2 - A taxonomy and new directions

AU - Zhu, Sencun

AU - Jajodia, Sushil

PY - 2010/12/1

Y1 - 2010/12/1

N2 - Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.

AB - Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.

UR - http://www.scopus.com/inward/record.url?scp=79958241078&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79958241078&partnerID=8YFLogxK

U2 - 10.1007/978-0-387-73821-5_3

DO - 10.1007/978-0-387-73821-5_3

M3 - Chapter

SN - 9780387738208

SP - 57

EP - 75

BT - Network Security

PB - Springer US

ER -