Analysis and Design of Robust Key Schemes for Multicast Communications
Authors :
Poovendran, Radha.
Conference : ATIRP 4th Annual Conference pp. 425-429
Date: March 21 - March 23, 2000
Recent literature presents several rooted tree based member deletion/revocation schemes {5, 6, 7, 8, 1, 2} trying to simultaneously minimize the key storage while providing efficient member deletion/revocation. Many of these approaches have different solutions and provide different values for the number of keys to be stored and distributed. In this paper, we show that these problems can be systematically studied using basic concepts from information theory. In particular, we show that the entropy of member revocation event, plays a ma;or role in defining the key allocation requirements. We then relate the entropy of member revocation event to bounds on the key length. We also show that an optimal Huffman coding strategy used in {7, 8] leads to security weaknesses. A method for generating key management schemes to withstand varying degrees of member collusion is also presented.
Download Full Paper