Analysis and Design of Robust Key Schemes for Multicast Communications
dc.contributor.advisor | Baras, John S. | en_US |
dc.contributor.author | R. Poovendran | en_US |
dc.contributor.author | Baras, John S. | en_US |
dc.contributor.department | ISR | en_US |
dc.contributor.department | CSHCN | en_US |
dc.date.accessioned | 2007-05-23T10:08:12Z | |
dc.date.available | 2007-05-23T10:08:12Z | |
dc.date.issued | 1999 | en_US |
dc.description.abstract | Recent literature presents several rooted tree based member deletion/revocation schemes trying to simultaneously minimize the key storage whileproviding efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed. <p>In this paper, we show that these problems can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event plays a major role in defining the key allocation requirements. We then relate the entropy of member revocation event to bounds on the key length. <p>We also show that the optimal Huffman coding strategy used in leads to security weaknesses. A method for generating key management schemes to withstand varying degrees of member collusion is also presented.<p><i>ATIRP 4th Annual Conference</i> | en_US |
dc.format.extent | 45036 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1903/6074 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | ISR; TR 1999-35 | en_US |
dc.relation.ispartofseries | CSHCN; TR 1999-17 | en_US |
dc.subject | coding | en_US |
dc.subject | secure multicast | en_US |
dc.subject | key management | en_US |
dc.subject | key length | en_US |
dc.subject | Global Communication Systems | en_US |
dc.title | Analysis and Design of Robust Key Schemes for Multicast Communications | en_US |
dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1