Analysis and Design of Robust Key Schemes for Multicast Communications

Loading...
Thumbnail Image

Files

TR_99-35.pdf (43.98 KB)
No. of downloads: 290

Publication or External Link

Date

1999

Citation

DRUM DOI

Abstract

Recent literature presents several rooted tree based member deletion/revocation schemes trying to simultaneously minimize the key storage whileproviding efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed.

In this paper, we show that these problems can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event plays a major role in defining the key allocation requirements. We then relate the entropy of member revocation event to bounds on the key length.

We also show that the optimal Huffman coding strategy used in leads to security weaknesses. A method for generating key management schemes to withstand varying degrees of member collusion is also presented.

ATIRP 4th Annual Conference

Notes

Rights