Elsevier

Information Processing Letters

Volume 93, Issue 4, 28 February 2005, Pages 191-198
Information Processing Letters

Minimizing center key storage in hybrid one-way function based group key management with communication constraints

https://doi.org/10.1016/j.ipl.2004.10.012Get rights and content

Abstract

We study the problem of designing a storage efficient secure multicast key management scheme based on one-way function trees (OFT) for a prespecified key update communication overhead. Canetti, Malkin and Nissim presented a hybrid model that divides a group of N members into clusters of M members and assigns each cluster to one leaf node of a key tree. Using the model, we formulate a constrained optimization problem to minimize the center storage in terms of the cluster size M. Due to the monotonicity of the center storage with respect to M, we convert the constrained optimization into a fixed point equation and derive the optimal M* explicitly. We show that the asymptotic value of the optimal M*, given as μ+a1logealogeμ with μ=O(logN) and a being the degree of a key tree, leads to the minimal storage as O(NlogN), when the update communication constraint is given as O(logN). We present an explicit design algorithm that achieves minimal center storage for a given update communication constraint.

References (14)

  • D. Balenson, D.A. McGrew, A.T. Sherman, Key management for large dynamic groups: one-way function trees and amortized...
  • R. Canetti et al.

    Efficient communication-storage tradeoffs for multicast encryption

  • R. Canetti et al.

    Multicast security: a taxonomy and some efficient constructions

  • C. Duma et al.

    A hybrid key tree scheme for multicast to balance security and efficiency requirement

  • M. Heyman, private...
  • G. Horng

    Cryptanalysis of a key management scheme for secure multicast communications

    IEICE Trans. Commun.

    (2002)
  • W.C. Ku et al.

    An improved key management scheme for large dynamic groups using one-way function trees

There are more references available in the full text version of this article.

Cited by (18)

  • The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication

    2022, Proceedings - 2022 8th International Conference on Big Data Computing and Communications, BigCom 2022
  • A detailed study on security services in cloud environment

    2017, Proceedings - 2017 2nd International Conference on Recent Trends and Challenges in Computational Models, ICRTCCM 2017
View all citing articles on Scopus
1

This work is supported by CAREER grant from NSF ANI-0093187 and YIP from ARO under Cooperative Agreement DAAD19-02-1-0242.

View full text