Key management for secure multicast with dynamic controller

Hartono Kurnio, Rei Safavi-Naini, Willy Susilo, Huaxiong Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

Multicast security has been intensively studied in recent years. In all previous schemes a trusted group controller is essential. However this is a restrictive assumption in applications such as teleconferences among members of a dynamic group. This leads to the problem of constructing dynamic group controllers in the multicast environment. That is, after the initialisation of the system, each user in the group can establish a common key among a subset of users by broadcasting a message (or messages) such that only the users in the designated group are able to decrypt it. In this paper, we present two solutions, one based on key distribution patterns which can cater for both private key and public key settings, and the other using tree based key hierarchy structure by employing the Diffie-Hellman key exchange protocol. We assess security and efficiency of our proposed schemes.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings
Place of PublicationBerlin ; London
PublisherSpringer, Springer Nature
Pages178-190
Number of pages13
Volume1841
ISBN (Print)3540677429
DOIs
Publication statusPublished - 2000
Event5th Australasian Conference on Information Security and Privacy, ACISP 2000 - Brisbane, Australia
Duration: 10 Jul 200012 Jul 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1841
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other5th Australasian Conference on Information Security and Privacy, ACISP 2000
CountryAustralia
CityBrisbane
Period10/07/0012/07/00

Fingerprint

Dive into the research topics of 'Key management for secure multicast with dynamic controller'. Together they form a unique fingerprint.

Cite this