Big Island, HI, USA
Jan. 6, 2003 to Jan. 9, 2003
Linda Morales , Texas A&M University-Commerce
I. Hal Sudborough , University of Texas at Dallas
Mohamed Eltoweissy , James Madison University
M. Hossain Heydari , James Madison University
There are numerous applications that require secure group communication. Much recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups which undergo frequent fluctuations in group membership, the need for efficient encryption key management becomes critical. This paper presents a combinatorial formulation of the multicast key management problem that is applicable not only to the specific problem of multicast key management, but also to the general problem of managing keys for any type of trusted group communication, regardless of the underlying transmission method between group participants. Specifically, we describe Exclusion Basis Systems, show exactly when they exist, and demonstrate that such systems represent improvements over the current binary tree-based key management systems and other related systems.
Linda Morales, I. Hal Sudborough, Mohamed Eltoweissy, M. Hossain Heydari, "Combinatorial Optimization of Multicast Key Management", HICSS, 2003, 36th Hawaii International Conference on Systems Sciences, 36th Hawaii International Conference on Systems Sciences 2003, pp. 332b, doi:10.1109/HICSS.2003.1174906