DocumentCode :
1375657
Title :
Key management for restricted multicast using broadcast encryption
Author :
Abdalla, Michel ; Shavitt, Yuval ; Wool, Avishai
Author_Institution :
Lucent Technol. Bell Labs., Holmdel, NJ, USA
Volume :
8
Issue :
4
fYear :
2000
fDate :
8/1/2000 12:00:00 AM
Firstpage :
443
Lastpage :
454
Abstract :
The problem we address is how to communicate securely with a set of users (the target set) over an insecure broadcast channel. This problem occurs in two application domains: satellite/cable pay TV and the Internet MBone. In these systems, the parameters of major concern are the number of key transmissions and the number of keys held by each receiver. In the Internet domain, previous schemes suggest building a separate key tree for each multicast program, thus incurring a setup cost of at least k log k per program for target sets of size k. In the pay TV domain, a single key structure is used for all programs, but known theoretical bounds show that either very long transmissions are required, or that each receiver needs to keep prohibitively many keys. Our approach is targeted at both domains. Our schemes maintain a single key structure that requires each receiver to keep only a logarithmic number of establishment keys for its entire lifetime. At the same time our schemes admit low numbers of transmissions. In order to achieve these goals, and to break away from the theoretical bounds, we allow a controlled number of users outside the target set to occasionally receive the multicast. This relaxation is appropriate for many scenarios in which the encryption is used to force consumers to pay for a service, rather than to withhold sensitive information. For this purpose, we introduce f-redundant establishment key allocations, which guarantee that the total number of recipients is no more than f times the number of intended recipients. We measure the performance of such schemes by the number of key transmissions they require, by their redundancy f, and by the probability that a user outside the target set (a free-rider) will be able to decrypt the multicast. We prove a new lower bound, present several new establishment key allocations, and evaluate our schemes´ performance by extensive simulation
Keywords :
Internet; cryptography; digital television; multicast communication; set theory; telecommunication security; television broadcasting; Internet MBone; broadband digital TV network; broadcast encryption; encryption; free-riders; insecure broadcast channel; key management; key transmissions; key tree; lower bound; multicast program; performance measurement; probability; receiver; redundant establishment key allocations; restricted multicast; satellite/cable pay TV; secure communications; setup cost; simulation; single key structure; target set size; Buildings; Cable TV; Costs; Cryptography; Digital TV; Helium; Internet; Satellite broadcasting; TV broadcasting; Wool;
fLanguage :
English
Journal_Title :
Networking, IEEE/ACM Transactions on
Publisher :
ieee
ISSN :
1063-6692
Type :
jour
DOI :
10.1109/90.865073
Filename :
865073
Link To Document :
بازگشت