Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication

This paper introduces a new family of protocols addressing collaborative group key agreement for secure group communication in autonomous groups. I present three protocols with varying degrees of security and efciency. The rst protocol provides a non-authenticated key agreement and is suitable for applications with low security requirements. The second and third protocols add a DiÆe-Hellman-based authenticated key agreement to provide collaborative authentication. In particular, the third protocol uses G unther's concept of implicitlycerti ed public keys to achieve higher eÆciency. A major advantage of the protocols is that they allow eÆcient \join" and \leave" operations, while preserving perfect forward and backward secrecy. These protocols improve previously proposed schemes in the following ways: rst, they can be used for autonomous group key agreement, where no central server is necessary and no member has a special role. Also, the complexity is drastically reduced: compared to best currently used techniques, the number of rounds for the initial key agreement are reduced from n to log(n), and the bandwidth requirements are reduced from O(n) to O(n), where n is the number of members. In addition, I present new primitives that enforce rights management policies in the group (such as sender authorization).

[1]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[2]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[3]  Gene Tsudik,et al.  Authenticated group key agreement and friends , 1998, CCS '98.

[4]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[5]  Louise E. Moser,et al.  Totem: a fault-tolerant multicast group communication system , 1996, CACM.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  M. Gerla,et al.  Multicasting protocols for high-speed, wormhole-routing local area networks , 1996, SIGCOMM '96.

[8]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[9]  Dilip D. Kandlur,et al.  Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[10]  Michael K. Reiter,et al.  Distributing trust with the Rampart toolkit , 1996, CACM.