A time driven methodology for key dimensioning in multicast communications

Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

This work considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model, and proposes a methodology to establish the minimal key length that guarantees a specified level of confidentiality. We reach such a result by analyzing and extending the threat model to the confidentiality of the multicast information. For this extended threat model, we present a methodology that takes into account the following parameters: (1) the required lifetime of the information confidentiality; (2) the level of the key in the LKH model; (3) the dynamics of the multicast group, that is the eviction rate of the users. From these rationales we develop an analytical model that, for each level, derives the appropriate key length, that is the minimal length that assures the desired degree of confidentiality under the hypotheses in the threat model. Finally, for a specific instance of the LKH model, we describe a numerical example that shows the saving that can be achieved in terms of the key lengths. © 2003 by Springer Science+Business Media New York.
Original languageEnglish (US)
Title of host publicationIFIP Advances in Information and Communication Technology
PublisherSpringer New York LLCbarbara.b.bertram@gsk.com
Pages121-132
Number of pages12
ISBN (Print)9781475764895
DOIs
StatePublished - Jan 1 2003
Externally publishedYes

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'A time driven methodology for key dimensioning in multicast communications'. Together they form a unique fingerprint.

Cite this