Skip to main content
Top

2002 | OriginalPaper | Chapter

Efficient State Updates for Key Management

Author : Benny Pinkas

Published in: Security and Privacy in Digital Rights Management

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed to use the content. When users leave or join the group the group key must be changed. The LKH (Logical Key Hierarchy) algorithm is a very common method of managing these key changes. In this algorithm every user keeps a personal key composed of log n keys (for a group of n users). A key update message consists of O(logn) keys.A major drawback of the LKH algorithm is that users must update their state whenever users join or leave the group. When such an event happens a key update message is sent to all users. A user who is offline during t key updates, and which needs to learn the keys sent in these updates as well as update its personal key, should receive and process the t key update messages, of total length O(tlogn) keys. In this paper we show how to reduce this overhead to a message of O(logt) keys. We also note that one of the methods that are used in this work to reduce the size of the update message can be used is other scenarios as well. It enables to generate n pseudo-random keys of length k bits each, such that any successive set of t keys can be represented by a string log(t) · k bits, without disclosing any information about the other keys.

Metadata
Title
Efficient State Updates for Key Management
Author
Benny Pinkas
Copyright Year
2002
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-47870-1_4

Premium Partner