Share Email Print

Proceedings Paper

Key management approach of multicast
Author(s): Zhen Jiang; Xi-lian Wang; Hong-ke Zhang; Li-yong Zhang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

A key management approach of multicast is provided in this paper. It is based on the approach of assignment key to every group member through key center. In view of some management schemes where members join, leave or are deleted, key service center must distribute new key through unicast another time. The bigger amount of members the greater expenses will be spent. In this paper with member varying their upper key service center still distribute the new keythrough multicast and an ID is assigned to every member to identify their transmission message so as to implement data origin authentication. The essential principle of this approach is distributing a key generator for each member. For example a random number generator depending on certain algorithm can be distributed. And every member needs store a seed table. In this project key can automatically be renewed as time goes by or immediately renewed. Replace unicast by multicast to renew key decrease the spending. It is not only suitable for the key centralized management scheme with fewer members but also for the key separated management scheme with large group members and member frequently changed.

Paper Details

Date Published: 29 August 2002
PDF: 5 pages
Proc. SPIE 4909, Network Design and Management, (29 August 2002); doi: 10.1117/12.481082
Show Author Affiliations
Zhen Jiang, Harbin Univ. of Science and Technology (China)
Xi-lian Wang, Northern Jiao Tong Univ. (China)
Hong-ke Zhang, Northern Jiao Tong Univ. (China)
Li-yong Zhang, Harbin Univ. of Science and Technology (China)

Published in SPIE Proceedings Vol. 4909:
Network Design and Management
Qian Mao; Shoa-Kai Liu; Kwok-wai Cheung, Editor(s)

© SPIE. Terms of Use
Back to Top