Share Email Print
cover

Proceedings Paper

Multilayer multicast key management with threshold cryptography
Author(s): Scott D. Dexter; Roman Belostotskiy; Ahmet M. Eskicioglu
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yields a scheme that is both more flexible and provably secure. Both the key-based and share-based hierarchical key distribution tree techniques are designed for managing keys for a single data stream. Recent work shows how redundancies that arise when this scheme is extended to multi-stream (e.g. scalable video) applications may be exploited in the key-based system by viewing the set of clients as a “multi-group”. In this paper, we present results from an adaptation of a multi-group key management scheme using threshold cryptography. We describe how the multi-group scheme is adapted to work with secret shares, and compare this scheme with a naïve multi-stream key-management solution by measuring performance across several critical parameters, including tree degree, multi-group size, and number of shares stored at each node.

Paper Details

Date Published: 22 June 2004
PDF: 11 pages
Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); doi: 10.1117/12.526662
Show Author Affiliations
Scott D. Dexter, CUNY/Brooklyn College (United States)
Roman Belostotskiy, CUNY/Brooklyn College (United States)
Ahmet M. Eskicioglu, CUNY/Brooklyn College (United States)


Published in SPIE Proceedings Vol. 5306:
Security, Steganography, and Watermarking of Multimedia Contents VI
Edward J. Delp; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top