Comparative Analysis of Distributed Group Key Establishment Protocols Based on Subgroup Approach

Nowadays, Internet has become the common media of communication. Many group communication applications can easily be conducted on the Internet. Some group communication applications pose strict requirement that in case of network partitions or on each join/leave event, a group key establishment protocol should not execute itself afresh. Although many group key establishment protocols have been proposed in the literature, yet nothing has been done to establish their suitability for aforementioned scenarios. In this paper, we present the succinct description of different decentralized group key establishment protocols based on independent subgroup key approach. And analyze them against parameters such as key independence, one-affects-all, local rekey, data transformation.

[1]  Kevin C. Almeroth,et al.  Collecting and modeling the join/leave behavior of multicast group members in the MBone , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.

[2]  J.W. Atwood,et al.  SIM-KM: scalable infrastructure for multicast key management , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[3]  J. William Atwood,et al.  Proxy encryptions for secure multicast key management , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[4]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[5]  Refik Molva,et al.  Scalable multicast security in dynamic groups , 1999, CCS '99.

[6]  Yang Richard Yang,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.

[7]  J. J. Garcia-Luna-Aceves,et al.  The ordered core based tree protocol , 1997, Proceedings of INFOCOM '97.

[8]  J. J. Garcia-Luna-Aceves,et al.  KHIP—a scalable protocol for secure multicast routing , 1999, SIGCOMM '99.

[9]  Yacine Challal,et al.  SAKM: a scalable and adaptive key management approach for multicast communications , 2004, CCRV.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Li Gong,et al.  Trade-offs in routing private multicast traffic , 1995, Proceedings of GLOBECOM '95.

[12]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .