An efficient group key management protocol using code for key calculation: CKC

This paper presents a new group key management protocol, CKC (Code for Key Calculation) for secure IP multicast. In this protocol which is based on logical key hierarchy, only the group key needs to be sent to new member at join. Then, using the group key current members and the new member calculate the necessary keys by node codes and one-way hash function. A node code is a random number assigned to each node to help users calculate necessary keys. Again, at leave server just sends the new group key to the remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results show that CKC reduces computational and communication overhead, and message size largely at join without increasing them at leave.

[1]  Pin-Han Ho,et al.  A New Dynamic Group Key Management Scheme with Low Rekeying Cost , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[2]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[3]  Feipei Lai,et al.  Efficient Group Key Management Protocol with One-Way Key Derivation , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[4]  JongWon Kim,et al.  An efficient LKH tree balancing algorithm for group key management , 2006, IEEE Communications Letters.

[5]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[6]  Seung-Woo Seo,et al.  Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..

[7]  Toshihiko Kato,et al.  A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation , 2007, Comput. Networks.

[8]  Xiulin Hu,et al.  A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.

[9]  Zhong-hua He,et al.  Dynamic key management in a user hierarchy , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.