A reliable group key management scheme for broadcast encryption

Junbeom Hur, Younho Lee

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

A major challenge achieving scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during transmission over an insecure broadcast channel, or transmitted to receivers while they were off-line. In this study, we propose a novel group key management scheme. It features a mechanism to allow legitimate receivers to recover the current group key, even if they lose key update messages for long-term sessions. The scheme uses short hint messages and member computation. Performance analysis shows that the proposed scheme has the advantages of scalability and efficient rekeying compared to previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast in which there is no feedback channel from receivers to the broadcasting station.

Original languageEnglish
Article number7487982
Pages (from-to)246-260
Number of pages15
JournalJournal of Communications and Networks
Volume18
Issue number2
DOIs
Publication statusPublished - 2016 Apr

Bibliographical note

Funding Information:
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2013R1A1A2011754). Also, this work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2013R1A2A2A01005559).

Publisher Copyright:
© 2011 KICS.

Keywords

  • Access control
  • broadcast encryption
  • reliable key distribution
  • stateless receiver

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A reliable group key management scheme for broadcast encryption'. Together they form a unique fingerprint.

Cite this