New constructions for multicast re-keying schemes using perfect hash families

R. Safavi-Naini*, H. Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

37 Citations (Scopus)

Abstract

A secure multicast scheme allows a group controller (or a centre) to send messages securely over a multicast channel to a dynamically changing group of users. In this paper we show efficient methods of establishing a common key among dynamic subgroups of a multicast group such that collusion of up to w malicious users cannot have information about the established key. We call this re-keying problem. We propose two basic constructions, called AND and OR schemes, for multicast re-keying problem using perfect hash families. We show that one scheme is most efficient when the subgroup size is close to the full group, and the other when the subgroup size is very small. Both schemes require O(log n) keys storage for both the group controller and the user, and achieve O(log n) communication complexity in their optimal applications. We further show how to improve communication efficiency of the basic OR scheme using erasure codes. Finally we extend the model of the single controller to dynamic controller in which any user of the group can establish a common key with a subgroup of the original group, and give extensions of AND and OR schemes for this case.

Original languageEnglish
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages228-234
Number of pages7
Publication statusPublished - 2000
Event7th ACM Conference on Computer Communications Security - Athens, Greece
Duration: 1 Nov 20004 Nov 2000

Other

Other7th ACM Conference on Computer Communications Security
CountryGreece
CityAthens
Period1/11/004/11/00

Keywords

  • Broadcast encryption
  • Perfect hash family
  • Secure multicasting

Fingerprint Dive into the research topics of 'New constructions for multicast re-keying schemes using perfect hash families'. Together they form a unique fingerprint.

  • Cite this

    Safavi-Naini, R., & Wang, H. (2000). New constructions for multicast re-keying schemes using perfect hash families. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 228-234). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE).