Paper
29 August 2002 Key management approach of multicast
Zhen Jiang, Xi-lian Wang, Hong-ke Zhang, Li-yong Zhang
Author Affiliations +
Proceedings Volume 4909, Network Design and Management; (2002) https://doi.org/10.1117/12.481082
Event: Asia-Pacific Optical and Wireless Communications 2002, 2002, Shanghai, China
Abstract
A key management approach of multicast is provided in this paper. It is based on the approach of assignment key to every group member through key center. In view of some management schemes where members join, leave or are deleted, key service center must distribute new key through unicast another time. The bigger amount of members the greater expenses will be spent. In this paper with member varying their upper key service center still distribute the new keythrough multicast and an ID is assigned to every member to identify their transmission message so as to implement data origin authentication. The essential principle of this approach is distributing a key generator for each member. For example a random number generator depending on certain algorithm can be distributed. And every member needs store a seed table. In this project key can automatically be renewed as time goes by or immediately renewed. Replace unicast by multicast to renew key decrease the spending. It is not only suitable for the key centralized management scheme with fewer members but also for the key separated management scheme with large group members and member frequently changed.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhen Jiang, Xi-lian Wang, Hong-ke Zhang, and Li-yong Zhang "Key management approach of multicast", Proc. SPIE 4909, Network Design and Management, (29 August 2002); https://doi.org/10.1117/12.481082
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Data centers

Network security

Information security

Internet

Video

Document management

RELATED CONTENT

Analysis of the possibilities of using IPSec on a Linux...
Proceedings of SPIE (October 01 2018)
Machines accessed via Internet issues and architecture
Proceedings of SPIE (November 08 1999)
Watermarking requirements for Boeing digital cinema
Proceedings of SPIE (June 20 2003)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)

Back to Top