Efficient identity-based multicast scheme from bilinear pairing

In a multicast communication system, when the membership changes, the group key must be refreshed securely and efficiently. The efficiency of the group key refreshment is critical, especially in a dynamic and large group since the size of deleted or added members may be quite large. An efficient identity-based multicast scheme based on pairings is proposed. It has distinct advantages in secure service over the existing schemes in the sense of dynamic group key management. The scheme satisfies forward secrecy and backward secrecy. A solution is also presented to the source authentication and data integrity services without introducing additional computation. In this scheme, the member can be a stateless receiver, who does not need to update his/her state from session to session.

[1]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[2]  Anna Lysyanskaya,et al.  Forward-Secure Hierarchical ID-Based Cryptography , 2003, IACR Cryptol. ePrint Arch..

[3]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[4]  Gene Tsudik,et al.  IP multicast security: Issues and directions , 2000, Ann. des Télécommunications.

[5]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[6]  Dilip D. Kandlur,et al.  Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[7]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[8]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[9]  Ben Lynn,et al.  Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..

[10]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[11]  Victor S. Miller,et al.  The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.

[12]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).