An Information Theoretic Approach for Design and Analysis of Rooted-Tree Based Multicast Key Management Schemes

Loading...
Thumbnail Image

Files

TR_99-36.pdf (1.42 MB)
No. of downloads: 1224

Publication or External Link

Date

1999

Citation

DRUM DOI

Abstract

Recent literature presents several rooted tree based member deletion/ revocation schemes trying to simultaneously minimize the key storage while providing efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed.

In this paper, we show that many of these papers can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event plays a major role in defining the key allocation requirements.

We then relate the entropy of member revocation event to provide bounds on the key length. We also show that the optimal Huffman coding strategy used leads to security weakness. A method for generating key management schemes with varying degrees of member collusion is also presented in this paper.

Journal of IEEE Transaction on Information Theory

Notes

Rights