On rekey policies for secure group applications

Qingyu Zhang, Kenneth L. Calvert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key; that key in turn is distributed securely to the group using one of several mechanisms that rely on each member having a unique set of "key encryption" keys. As users join and leave the group, members' keysets have to be changed according to a rekey policy. The rekey policy is important because it determines the security properties provided to the application (e.g. forward/backward secrecy). In this paper we present a general model of rekey policies for large-scale applications, and use it to compare the effectiveness of policies proposed in the literature for various applications. Unlike prior work, which has focused on the cost of rekeying, our model also accounts for the cost of not rekeying. We cast existing policies in terms of our model and then propose a more flexible policy that we call exposure-oriented rekeying. We present simulation results showing that our new policy reduces the peak and variation in cost to achieve a given level of security, compared with periodic or batch-oriented rekeying policies.

Original languageEnglish
Title of host publicationProceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003
EditorsRonald P. Luijten, E.K. Park, Luiz DaSilva
Pages559-564
Number of pages6
ISBN (Electronic)0780379454
DOIs
StatePublished - 2003
Event12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003 - Dallas, United States
Duration: Oct 20 2003Oct 22 2003

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2003-January
ISSN (Print)1095-2055

Conference

Conference12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003
Country/TerritoryUnited States
CityDallas
Period10/20/0310/22/03

Bibliographical note

Publisher Copyright:
© 2003 IEEE.

Keywords

  • Broadcast technology
  • Broadcasting
  • Communication system control
  • Costs
  • Cryptography
  • Data security
  • Internet
  • Large-scale systems
  • Multimedia communication
  • Telecommunication traffic

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'On rekey policies for secure group applications'. Together they form a unique fingerprint.

Cite this