Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1128817.1128875acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

A distributed key assignment protocol for secure multicast based on proxy cryptography

Published: 21 March 2006 Publication History

Abstract

A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. However, this raises the problem of "one affects all," whereby the actions of one member affect the whole group. Many researchers solve the problem by dividing a group into several subgroups, but most existing solutions require a centralized trusted controller to coordinate cryptographic keys for subgroups. We believe this is a constraint on network scalability. In this paper, we propose a novel framework to solve key management problems in multicast networks. Our contribution is three-fold: 1) We exploit the ElGamal cryptosystem and propose the idea of key composition; 2) A distributed key assignment protocol is proposed to eliminate the need for a centralized trust controller in a secure multicast network that leverages proxy cryptography; and 3) We adopt a hybrid encryption technique that makes our framework more efficient and practical. Comparison with similar frameworks shows the proposed scheme is efficient in both time and space complexity. In addition, costs of most protocol operations are bounded by constants regardless of a group's size and the degree of transit nodes.

References

[1]
M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. In Proceedings of Advances in Cryptology: EUROCRYPT'98: International Conference on the Theory and Applications of Cryptology Techniques, pages 127--144. LNCS, May 1998.
[2]
T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469--472, 1985.

Cited By

View all
  • (2017)Prediction of intracranial hypertension through noninvasive intracranial pressure waveform analysis in pediatric hydrocephalusChild's Nervous System10.1007/s00381-017-3475-133:9(1517-1524)Online publication date: 16-Jun-2017
  • (2015)Indonesian medical question classification with pattern matching2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT)10.1109/ICACOMIT.2015.7440185(106-109)Online publication date: Oct-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
March 2006
384 pages
ISBN:1595932720
DOI:10.1145/1128817
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 March 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ElGamal cryptosystem
  2. key composition
  3. proxy cryptography
  4. secure multicast

Qualifiers

  • Article

Conference

Asia CCS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Prediction of intracranial hypertension through noninvasive intracranial pressure waveform analysis in pediatric hydrocephalusChild's Nervous System10.1007/s00381-017-3475-133:9(1517-1524)Online publication date: 16-Jun-2017
  • (2015)Indonesian medical question classification with pattern matching2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT)10.1109/ICACOMIT.2015.7440185(106-109)Online publication date: Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media