Efficient revocation schemes for secure multicast

Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Abstract

Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient group key management. We propose new schemes for user revocation that can be used to establish a common key among subgroups of users. The schemes can be used with static or dynamic group initiator and allow temporary and permanent revocation of users. We also give a method of adding authentication to the proposed schemes. We prove security and compare efficiency of the new schemes.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages160-177
Number of pages18
Volume2288
ISBN (Print)3540433198, 9783540433194
Publication statusPublished - 2002
Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
Duration: 6 Dec 20017 Dec 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2288
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Information Security and Cryptology, ICISC 2001
CountryKorea, Republic of
CitySeoul
Period6/12/017/12/01

Fingerprint Dive into the research topics of 'Efficient revocation schemes for secure multicast'. Together they form a unique fingerprint.

  • Cite this

    Kurnio, H., Safavi-Naini, R., & Wang, H. (2002). Efficient revocation schemes for secure multicast. In Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings (Vol. 2288, pp. 160-177). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2288). Berlin: Springer, Springer Nature.