1999
DOI: 10.1007/3-540-48910-x_32
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Communication-Storage Tradeoffs for Multicast Encryption

Abstract: We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of different scenarios using multicast, presenting a wide range of efficiency requirements with respect to several parameters. We give an upper bound on the tradeoff between storage and communication parameters. In particular, we suggest an improvement of the schemes by Wallner et al. and Wong et al. [13,14] with sub-linear center storage, without a significant loss in other parameters. Corre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
173
0

Year Published

1999
1999
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 162 publications
(175 citation statements)
references
References 12 publications
2
173
0
Order By: Relevance
“…Since the key tree structure has good properties, modifications of the methods of [24,25] have been proposed [5,11,16,17]. Some of them reduce the messages for a single revocation to log N by combining the key tree structure with another technique.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the key tree structure has good properties, modifications of the methods of [24,25] have been proposed [5,11,16,17]. Some of them reduce the messages for a single revocation to log N by combining the key tree structure with another technique.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them reduce the messages for a single revocation to log N by combining the key tree structure with another technique. McGrew et al [16] used a one-way function, Canetti et al [5] used a pseudo random generator, and Kim et al [11] used Diffie-Hellman key exchange scheme [9]. The number of keys a receiver stores remains log N + 1, while their methods increase the computational overhead at a receiver, namely, each receiver needs to perform the computation of such a technique at most log N times.…”
Section: Related Workmentioning
confidence: 99%
“…Also recall that (as in other schemes) there are three main overloads related to the proposed key management: storage@receiver, processing@receiver and communications overload. Taking into account certain constraints on these parameters, the proposed schemes can be optimized following the approaches reported in [3] and [19]. For example, for given constraints on storage@receiver and processing@receiver, the schemes can be optimized regarding the communications overload, or for the given communications budget, the schemes can be optimized regarding storage@receiver and processing@receiver.…”
Section: Discussionmentioning
confidence: 99%
“…Later on, a number of different schemes as well as the system approaches, have been reported and analyzed -see [16], [20]- [21], [3], [1], [9], [17], [18], [19], [2] and [4], for example, and recently, certain results have been reported in [11], [13], [6], [5], [14] and [15], as well.…”
Section: Introductionmentioning
confidence: 99%
“…[4] show how to use pseudo-random generators to reduce by a constant factor the transmission overhead, but still require an exponential number of total keys. Canetti, Malkin, and Nissim [5] explore further trade-offs possible between the transmission overhead, user keys, and server keys possible by varying the scheme of [27]. Their constructions do not achieve feasible server storage, and indeed they give evidence that it is not possible to have communication overhead, user storage, and server storage all be polynomial in k and n if one requires security for arbitrary k.…”
Section: Introductionmentioning
confidence: 99%