22 June 2004 Multilayer multicast key management with threshold cryptography
Author Affiliations +
The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yields a scheme that is both more flexible and provably secure. Both the key-based and share-based hierarchical key distribution tree techniques are designed for managing keys for a single data stream. Recent work shows how redundancies that arise when this scheme is extended to multi-stream (e.g. scalable video) applications may be exploited in the key-based system by viewing the set of clients as a “multi-group”. In this paper, we present results from an adaptation of a multi-group key management scheme using threshold cryptography. We describe how the multi-group scheme is adapted to work with secret shares, and compare this scheme with a naïve multi-stream key-management solution by measuring performance across several critical parameters, including tree degree, multi-group size, and number of shares stored at each node.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Scott D. Dexter, Roman Belostotskiy, Ahmet M. Eskicioglu, "Multilayer multicast key management with threshold cryptography", Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); doi: 10.1117/12.526662; https://doi.org/10.1117/12.526662


Secure multimedia browser over network
Proceedings of SPIE (May 12 2006)
ATM payload encryption and security-on-demand
Proceedings of SPIE (January 03 1996)
Static algorithm based on MPLS and QoS routing
Proceedings of SPIE (April 15 2004)
Provision of quality of service for virtual private networks
Proceedings of SPIE (February 02 2001)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)

Back to Top