Analysis and Design of Robust Key Schemes for Multicast Communications

dc.contributor.advisorBaras, John S.en_US
dc.contributor.authorR. Poovendranen_US
dc.contributor.authorBaras, John S.en_US
dc.contributor.departmentISRen_US
dc.contributor.departmentCSHCNen_US
dc.date.accessioned2007-05-23T10:08:12Z
dc.date.available2007-05-23T10:08:12Z
dc.date.issued1999en_US
dc.description.abstractRecent literature presents several rooted tree based member deletion/revocation schemes trying to simultaneously minimize the key storage whileproviding efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed. <p>In this paper, we show that these problems can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event plays a major role in defining the key allocation requirements. We then relate the entropy of member revocation event to bounds on the key length. <p>We also show that the optimal Huffman coding strategy used in leads to security weaknesses. A method for generating key management schemes to withstand varying degrees of member collusion is also presented.<p><i>ATIRP 4th Annual Conference</i>en_US
dc.format.extent45036 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/1903/6074
dc.language.isoen_USen_US
dc.relation.ispartofseriesISR; TR 1999-35en_US
dc.relation.ispartofseriesCSHCN; TR 1999-17en_US
dc.subjectcodingen_US
dc.subjectsecure multicasten_US
dc.subjectkey managementen_US
dc.subjectkey lengthen_US
dc.subjectGlobal Communication Systemsen_US
dc.titleAnalysis and Design of Robust Key Schemes for Multicast Communicationsen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR_99-35.pdf
Size:
43.98 KB
Format:
Adobe Portable Document Format