In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable. This allows the set of receivers to be arbitrarily large. A large set of receivers (leaves) poses scalability problems when the multicast source (root) needs to collect data from the receivers. The literature on this subject is rather scarce. For a reverse multicast communication system to be scalable, it is necessary that intermediate multicast routers in the tree collect messages from their child nodes, aggregate them and send them back to their parent node. In this way, the root finally obtains a single message containing all data. Scalability also requires that aggregation of messages does not result in a size growth of the aggregated message. We focus on this problem with the extra requirements that leaf-to-root traffic should stay confidential and authentic. The few existing solutions satisfying all these requirements are such that, for a tree with n leaves, messages have an O(n) constant length. Therefore, such proposals are only practical for moderate values of n. We propose here a new protocol offering confidentiality, integrity and authentication that is more efficient than previous literature when communication is biased, i.e., when the probabilities of sending '1' or '0' are clearly different. Messages have an O(k log k log n) constant length, where k is an upper bound on the number of leaves transmitting the least probable bit in a certain time slot.
[1]
Josep Domingo-Ferrer,et al.
Secure Reverse Communication in a Multicast Tree
,
2004,
NETWORKING.
[2]
Tilman Wolf,et al.
Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks
,
2003,
IEEE Trans. Syst. Man Cybern. Part C.
[3]
T. Dierks,et al.
The TLS protocol
,
1999
.
[4]
Ronald L. Rivest,et al.
The MD5 Message-Digest Algorithm
,
1992,
RFC.
[5]
Tatsuaki Okamoto,et al.
A New Public-Key Cryptosystem as Secure as Factoring
,
1998,
EUROCRYPT.
[6]
Kevin C. Almeroth,et al.
IP Multicast Applications: Challenges and Solutions
,
2001,
RFC.
[7]
Roger L. Peterson,et al.
Introduction to Spread Spectrum Communications
,
1995
.
[8]
Josep Domingo-Ferrer,et al.
Secure Many-to-One Transmission of q-ary Symbols
,
2004,
INTELLCOMM.
[9]
Christopher Allen,et al.
The TLS Protocol Version 1.0
,
1999,
RFC.
[10]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.