Key management for differentially secure multicast

Jianping Wang*, Xiangtong Qi

*Corresponding author for this work

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

4 Citations (Scopus)

Abstract

Differentially secure multicast is a generalized secure multicast model, where both data and group members are classified into different security levels. In this paper, we study the key management problem for differentially secure multicast. Two key management protocols are proposed, both of which are extensions of the logical key hierarchy (LKH) scheme. One is called data security level LKH and the other is called user security level LKH. We then discuss how to extend them to distributed key management protocols. Simulations are conducted to compare these two protocols and identify various conditions under which one protocol may work better than the other.

Original languageEnglish
Title of host publicationProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
EditorsM.H. Hamza, M.H. Hamza
Pages226-231
Number of pages6
Publication statusPublished - 2003
EventProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology - Scottdale, AZ, United States
Duration: 17 Nov 200319 Nov 2003

Publication series

NameProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology

Conference

ConferenceProceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology
Country/TerritoryUnited States
CityScottdale, AZ
Period17/11/0319/11/03

Keywords

  • Differentially secure multicast
  • Key management
  • LKH
  • Multicast

Fingerprint

Dive into the research topics of 'Key management for differentially secure multicast'. Together they form a unique fingerprint.

Cite this