Title :
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Author :
Heyd, M.H. ; Morales, L. ; Sudborough, I.H.
Author_Institution :
James Madison University
Abstract :
Secure multicast has a variety of applications in e-commerce, e-banking, command and control, video-on-demand, and other internet-based services. In this paper, we present algorithms to improve on the number of re-keying messages (overhead) needed to add and delete sets of users to a secure multicast group. We present upper and lower bounds on the number of re-keying bits to add or delete groups of users from secure multicast groups. We also show how to amortize the cost of group re-keying over time to avoid long periods of system overhead that can potentially block the transmission of desired data at times when large numbers of users simultaneously join or leave multicast sessions.
Keywords :
Secure multicast; batch re-keying; group key management; re-key complexity; secure multicast re-keying multicasting; security; tree-based system; Binary trees; Business; Command and control systems; Computer science; Cryptography; Data security; Electronic commerce; Information systems; Multicast algorithms; Web and internet services; Secure multicast; batch re-keying; group key management; re-key complexity; secure multicast re-keying multicasting; security; tree-based system;
Conference_Titel :
System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on
Print_ISBN :
0-7695-2507-5
DOI :
10.1109/HICSS.2006.143