An efficient structure for LKH key tree on secure multicast communications

In order to communicate in cipher over IP multi-cast, each of joining and leaving participants causes renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH, one of the key management systems, uses a tree structure to manage keys to share with participants. Every node of the tree is given a key, and each leaf of the tree is corresponding to a participant. If all members are handled equally, by using a balanced binary tree, the average number of renewed keys per join and leave is estimated at ⌈log 2 n ⌉, where n denotes the number of participants. In this study, we introduce a scenario that the key management system can distinguish between inconstant members and stable members, instead of handling members equally. Under this scenario, our system improves the number of renewing keys efficiently by considering another tree structure against the balanced binary tree structure.

[1]  David Pisinger A Minimal Algorithm for the Bounded Knapsack Problem , 1995, IPCO.

[2]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[3]  D. Huffman A Method for the Construction of Minimum-Redundancy Codes , 1952 .

[4]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[5]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[6]  Thomas Hardjono,et al.  Group key management for IP multicast: model & architecture , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[7]  Francisco Rico-Novella,et al.  Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[8]  Kuan-Ta Chen,et al.  An analysis of WoW players' game hours , 2008, NETGAMES.

[9]  Avishai Wool,et al.  Key management for restricted multicast using broadcast encryption , 2000, TNET.