Skip to main content
Article thumbnail
Location of Repository

An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes

By Radha Poovendran and John S. Baras

Abstract

Abstract—Recent literature presents several seemingly different approaches to rooted-tree-based multicast key distribution schemes [6]–[8], [28], [29] that try to minimize the user key storage while providing efficient member deletion. In this paper, we show that the user key storage on rooted trees can be systematically studied using basic concepts from information theory. We show that the rooted-tree-based multicast key distribution problem can be posed as an optimization problem that is abstractly identical to the optimal codeword length selection problem in information theory. In particular, we show that the entropy of member deletion statistics quantifies the optimal value of the average number of keys to be assigned to a member. We relate the sustainable key length to statistics of member deletion event and the hardware bit generation rate. We then demonstrate the difference between the key distribution on rooted trees and the optimal codeword-length selection problem with an example of a key distribution scheme that attains optimality but fails to prevent user collusion [7], [8]. Index Terms—Collusion, entropy, member deletion, multicast security. I

Year: 2001
OAI identifier: oai:CiteSeerX.psu:10.1.1.170.4136
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.ece.umd.edu/%7Ebara... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.