DocumentCode :
379572
Title :
Establishment of conference keys in heterogeneous networks
Author :
Trappe, Wade ; Wang, Yuke ; Liu, K. J Ray
Author_Institution :
Dept. of Electr. & Comput. Eng., Maryland Univ., MD, USA
Volume :
4
fYear :
2002
fDate :
2002
Firstpage :
2201
Abstract :
In order to secure communication amongst members of a conference, a secret shared by all group members must be established. The Diffie-Hellman problem is often the basis for generating keys in two-party communication, and can also be used to establish conference keys. In heterogeneous networks, many conferences have participants of varying computational power and resources. Most conference keying schemes do not address this concern and place the same burden upon less-powerful clients as more-powerful ones. The establishment of conference keys should try to minimize the burden placed on more resource-limited users while ensuring that the entire group can establish the group secret. In this paper, we present a scheme for establishing a conference key using the two-party Diffie-Hellman scheme. The scheme is hierarchical, forming subgroup keys for successively larger subgroups en route to establishing the group key. A full, binary tree called the conference tree governs the order in which subgroup keys are formed. Key establishment schemes that consider users with varying costs or budgets are designed by appropriately choosing the conference tree. The tree that minimizes the total group cost is produced via the Huffman algorithm. A criterion is presented for the existence of a conference tree when users have varying budgets, and a greedy algorithm is presented that minimizes the total length of the conference tree under budget constraints.
Keywords :
Huffman codes; algorithm theory; minimisation; public key cryptography; telecommunication security; tree data structures; Huffman coding; binary tree; conference keys; conference tree; cost minimization; greedy algorithm; heterogeneous networks; key establishment schemes; secret sharing; secure communication; subgroup keys; two-party Diffie-Hellman scheme; varying budgets; varying costs; Bandwidth; Binary trees; Computer networks; Cost function; Cryptography; Educational institutions; Greedy algorithms; Intelligent networks; Protection; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, 2002. ICC 2002. IEEE International Conference on
Print_ISBN :
0-7803-7400-2
Type :
conf
DOI :
10.1109/ICC.2002.997237
Filename :
997237
Link To Document :
بازگشت