Secure multicast using proxy encryption

35Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one "group key" shared by all group members. However, this incurs the so-called "1 affects n problem," that is, an action of one member affects the whole group. We believe this is the source of scalability problems. Moreover, from the administrative perspective, it is desired to confine the impacts of changing membership events in a local area. In this paper, we propose a new secure multicast architecture without using a group key. We exploit a cryptographic primitive "proxy encryption." It allows routers to convert a ciphertext encrypted under a key to a ciphertext encrypted under another key, with-out revealing the secret key and the plaintext. By giving proper keys to intermediate routers, routers could provide separation between subgroups. Therefore the goals of scalability and containment are achieved. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Chiu, Y. P., Lei, C. L., & Huang, C. Y. (2005). Secure multicast using proxy encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3783 LNCS, pp. 280–290). https://doi.org/10.1007/11602897_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free