Title :
HySOR: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers
Author :
Fan, Jinliang ; Judge, Paul ; Ammar, Mostafa H.
Author_Institution :
Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
One problem in securing group communication is the scalability of group key management in dynamic multicast sessions. The main challenge arises when a member leaves the multicast session and a rekeying of the group is required to prevent the departing member from accessing the information being multicast after they leave. Recent research developed the logical key hierarchy (LKH) protocol which uses a tree structuring of receivers and requires O(log(n)) rekeying messages when a member leaves. It has also been demonstrated that Ω(log(n)) is the best one can achieve if strict confidentiality and non-collusion are required. While strict non-collusion is required for some highly sensitive data, we argue that some commercial content delivery applications will be extremely cost sensitive and willing to tolerate some small level of collusion. In this paper we consider the question of how one might trade off the message cost of rekeying with some increased vulnerability to collusion. We consider a range of protocols. In one extreme is LKH which is completely immune from collusion. On the other extreme is a protocol based on the linear ordering of receivers (LORE), which requires O(1) messages for rekeying but in which any two receivers can collude. We describe a scheme using a hybrid structuring of receivers (HySOR) which is tunable between the LKH and LORE extremes and by which one can trade off some vulnerability to collusion for a decrease in rekeying message cost. We provide analytical as wen as simulation results to investigate the performance of HySOR and its tunability along the collusion/scalability spectrum.
Keywords :
Internet; cryptography; message authentication; multicast protocols; HySOR; client authentication; collusion-scalability tradeoffs; confidentiality; content delivery applications; dynamic multicast sessions; encrypting; group communication; group key management; hybrid structuring; linear ordering; logical key hierarchy; multicast communications; noncollusion; tree structuring; vulnerability; Business; Computer network management; Computer networks; Costs; Cryptography; Educational institutions; Protocols; Scalability; Subscriptions; Telecommunication computing;
Conference_Titel :
Computer Communications and Networks, 2002. Proceedings. Eleventh International Conference on
Print_ISBN :
0-7803-7553-X
DOI :
10.1109/ICCCN.2002.1043066