Secure anonymous group infrastructure for common and future Internet applications

Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as video conferencing or distance education. We propose a framework for marrying such approaches with access management mechanisms and applications in real environments. Furthermore, we extend this framework with anonymisation techniques for the sake of the individual's privacy. Our solution combines traditional unicast based approaches for privacy with authenticated and encrypted group communication. Thereby, we are able to build closed groups in which the members are not disclosed to outsiders. The introduced secure and anonymous multicast (SAM) framework can be employed as a scalable, configurable architecture for pseudonym based group communication between qualified entities.

[1]  Danny Dolev,et al.  Optimized Rekey for Group Communication Systems , 2000, NDSS.

[2]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[3]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[4]  Nathalie Weiler,et al.  Semsomm-a scalable multiple encryption scheme for one-to-many multicast , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[5]  David A. Wagner,et al.  TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web , 1998, First Monday.

[6]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[7]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[8]  Secure Anonymous Protocols for Local and Multicast Environments , 2000 .

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[11]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[12]  Jon Crowcroft,et al.  Multicast-specific security threats and counter-measures , 1995, Proceedings of the Symposium on Network and Distributed System Security.

[13]  Andreas Rieke,et al.  Securing the anonymity of content providers in the World Wide Web , 1999, Electronic Imaging.

[14]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[15]  Yossi Matias,et al.  On secure and pseudonymous client-relationships with multiple servers , 1998, TSEC.

[16]  Andreas Pfitzmann Diensteintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz , 1990, Informatik-Fachberichte.

[17]  William C. Fenner Internet Group Management Protocol, Version 2 , 1997, RFC.

[18]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.