Algorithms for dynamic multicast key distribution trees

Many secure group communication systems rely on a group key, which is a secret shared among the members of the group. Secure messages are sent to the group by encrypting them with the group key. Because group membership is dynamic, it becomes necessary to change the group key in an efficient and secure fashion when members join or leave the group. We present a series of algorithms for solving this problem based on 2--3 trees, where each internal node has degree 2 or 3. The algorithms attempt to minimize the worst case communication cost of updating the group key and the auxiliary keys needed by the algorithms. The algorithms are analyzed for the worst case performance and evaluated empirically via simulations. We focus on the trade-off between the communication cost due to the structure of the tree and that due to the restructuring of the tree to maintain its structure.

[1]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[2]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[3]  Stephen E. Deering,et al.  Multicast routing in datagram internetworks and extended LANs , 1990, TOCS.

[4]  Gene Tsudik,et al.  Cliques: a protocol suite for key agreement in dynamic groups , 1997 .

[5]  Rudolf Bayer,et al.  Organization and maintenance of large ordered indexes , 1972, Acta Informatica.

[6]  Jessica Staddon,et al.  Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.

[7]  Dalit Naor,et al.  Broadcast Encryption , 1993, Encyclopedia of Multimedia.

[8]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[9]  J. J. Garcia-Luna-Aceves,et al.  KHIP—a scalable protocol for secure multicast routing , 1999, SIGCOMM '99.

[10]  Pankaj Rohatgi,et al.  Maintaining Balanced Key Trees for Secure Multicast , 1999 .

[11]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[12]  George Varghese,et al.  A lower bound for multicast key distribution , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[13]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[14]  Malibu Canyon RdMalibu Keystone: a Group Key Management Service , 2000 .

[15]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[16]  Ran Canetti,et al.  Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.