Abstract
Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key; that key in turn is distributed securely to the group using one of several mechanisms that rely on each member having a unique set of "key encryption" keys. As users join and leave the group, members' keysets have to be changed according to a rekey policy. The rekey policy is important because it determines the security properties provided to the application (e.g. forward/backward secrecy). In this paper we present a general model of rekey policies for large-scale applications, and use it to compare the effectiveness of policies proposed in the literature for various applications. Unlike prior work, which has focused on the cost of rekeying, our model also accounts for the cost of not rekeying. We cast existing policies in terms of our model and then propose a more flexible policy that we call exposure-oriented rekeying. We present simulation results showing that our new policy reduces the peak and variation in cost to achieve a given level of security, compared with periodic or batch-oriented rekeying policies.
Original language | English |
---|---|
Title of host publication | Proceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003 |
Editors | Ronald P. Luijten, E.K. Park, Luiz DaSilva |
Pages | 559-564 |
Number of pages | 6 |
ISBN (Electronic) | 0780379454 |
DOIs | |
State | Published - 2003 |
Event | 12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003 - Dallas, United States Duration: Oct 20 2003 → Oct 22 2003 |
Publication series
Name | Proceedings - International Conference on Computer Communications and Networks, ICCCN |
---|---|
Volume | 2003-January |
ISSN (Print) | 1095-2055 |
Conference
Conference | 12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003 |
---|---|
Country/Territory | United States |
City | Dallas |
Period | 10/20/03 → 10/22/03 |
Bibliographical note
Publisher Copyright:© 2003 IEEE.
Keywords
- Broadcast technology
- Broadcasting
- Communication system control
- Costs
- Cryptography
- Data security
- Internet
- Large-scale systems
- Multimedia communication
- Telecommunication traffic
ASJC Scopus subject areas
- Computer Networks and Communications
- Hardware and Architecture
- Software