Scalable Secure Bidirectional Group Communication
Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from multiple senders. In this paper we present a secure group communication scheme based on a new cryptosystem that admits a rigorou...
Saved in:
Published in | IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications pp. 875 - 883 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.05.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from multiple senders. In this paper we present a secure group communication scheme based on a new cryptosystem that admits a rigorous proof of security against adaptive chosen ciphertext attack (IND-CCA2). Our scheme is bi-directional, supporting both one-to-many and many-to-one communications. Compared with existing solutions, our scheme achieves the following improvements: (1) It guarantees data confidentiality and authenticity in both directions; (2) It is the most scalable solution so far among all existing schemes achieving (1). The group member storage overhead is constant while both the center storage and rekeying communication complexity are independent of group size. (3) It can be made to achieve higher level of security and hide even the information about the group dynamics. We show that this protection is more effective and more efficient than existing solutions. |
---|---|
AbstractList | Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from multiple senders. In this paper we present a secure group communication scheme based on a new cryptosystem that admits a rigorous proof of security against adaptive chosen ciphertext attack (IND-CCA2). Our scheme is bi-directional, supporting both one-to-many and many-to-one communications. Compared with existing solutions, our scheme achieves the following improvements: (1) It guarantees data confidentiality and authenticity in both directions; (2) It is the most scalable solution so far among all existing schemes achieving (1). The group member storage overhead is constant while both the center storage and rekeying communication complexity are independent of group size. (3) It can be made to achieve higher level of security and hide even the information about the group dynamics. We show that this protection is more effective and more efficient than existing solutions. |
Author | Yitao Duan Canny, J. |
Author_xml | – sequence: 1 surname: Yitao Duan fullname: Yitao Duan organization: California Univ., Berkeley – sequence: 2 givenname: J. surname: Canny fullname: Canny, J. organization: California Univ., Berkeley |
BookMark | eNotzMtKw0AUgOEBK9jWrl24yQuknjP3WWqwtVDtogruyknmBEZyKUmz8O1FdPXDt_gXYtb1HQtxh7BGhPCwe9sUh9e1BHBrBHclFqil1gjahZmYg9MqR2s_b8RqHL8AAIP13oa5wGNFDZUNZ0eupoGzpxTTwNUl9R012Xbop3NW9G07damiX70V1zU1I6_-uxQfm-f34iXfH7a74nGfJ3TmkpckNRtvoXRSQc3kfHSSTLTKY0naWqMluRAUVxWBV06zDRFNLLWKtVZLcf_3Tcx8Og-ppeH7pCUa64P6AXj0RXY |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/INFCOM.2007.107 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 883 |
ExternalDocumentID | 4215689 |
Genre | orig-research |
GroupedDBID | 23M 29I 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
ID | FETCH-LOGICAL-i175t-ba24e5860b7230fea78d72a5d6381ba466542a7993ecca08374e69d15db43df43 |
IEDL.DBID | RIE |
ISBN | 1424410479 9781424410477 |
ISSN | 0743-166X |
IngestDate | Wed Aug 27 01:43:54 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-ba24e5860b7230fea78d72a5d6381ba466542a7993ecca08374e69d15db43df43 |
PageCount | 9 |
ParticipantIDs | ieee_primary_4215689 |
PublicationCentury | 2000 |
PublicationDate | 2007-May |
PublicationDateYYYYMMDD | 2007-05-01 |
PublicationDate_xml | – month: 05 year: 2007 text: 2007-May |
PublicationDecade | 2000 |
PublicationTitle | IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications |
PublicationTitleAbbrev | INFCOM |
PublicationYear | 2007 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001968869 ssj0008726 |
Score | 1.660089 |
Snippet | Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 875 |
SubjectTerms | Communications Society Context Cryptography Data security Internet Intrusion detection Multicast protocols Protection Public key Secure storage |
Title | Scalable Secure Bidirectional Group Communication |
URI | https://ieeexplore.ieee.org/document/4215689 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTgJBEK0AJ724gHHPHDzaQDO9TF8lEjQBTZSEG-k1ISZgyHDx6-1lADEevM3MaSqV7lf9ut4rgDvlcqoJlsgILZEvqR1SHmWQ4sTqXGFuVBAKj8ZsOCHPUzqtwf1WC2Otjc1nth0e412-Wep1oMo6xOMTK0Qd6v7glrRaOz5FsKIIw7KrXbjgcdRasuBkbLoRdQVrArHxeqreeeX5g7ui8zQe9F9GydsQd_eHrkTMGRzBaPO3qdXko70uVVt__TJy_G84x9Daqfuy1y1unUDNLk7h8IcxYRPwm09dEFVlkY-32cM8YV8kDrNIWGV72pIWTAaP7_0hqoYroLmvGEqkZI9YWrCu4v4U4qzkheE9SY1fkFhJEqYS9yT35UtIsi_UfPKYMJgaRXLjSH4GjcVyYc8hM4RRR53MudDEOB-SY046Qh032nB2Ac0Q_Owz-WfMqrgv__58BQeJPw1NhdfQKFdre-OBv1S3MePfAVKmsw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LTsJAFL1BXKgbH2B824VLC7SdR2crkYBSNBESdmSeCTEBY9qNX-_MtIAYF-7arnpz057b03vOAbgTJsESRTxUTPLQjtQmFBZlQkGRlomIqBJOKJyNSH-CnqZ4WoP7tRZGa-2Xz3TLHfp_-WopC0eVtZHFJ5KyHdi1uI_jUq21YVQYSVMXl129h1Pqw9ZKE05CpitZlzMnYCu3p-qcVq4_UYe1B6Ne9yUr3Q2jznbsiked3iFkq_stl03eW0UuWvLrl5Xjfws6guZG3xe8rpHrGGp6cQIHP6wJGxC92eY5WVXgGXkdPMxL9PPUYeApq2BLXdKESe9x3O2HVbxCOLczQx4KHiONU9IR1H6HGM1pqmjMsbKPZCQ4crnEMad2gHFttqOabR9hKsJKoEQZlJxCfbFc6DMIFCLYYMMTyiRSxpZkiOEGYUOVVJScQ8MVP_soHTRmVd0Xf1--hb3-OBvOhoPR8yXsl2yqWzG8gnr-WehrOwbk4sZ3_xvvwan9 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+INFOCOM+2007+-+26th+IEEE+International+Conference+on+Computer+Communications&rft.atitle=Scalable+Secure+Bidirectional+Group+Communication&rft.au=Yitao+Duan&rft.au=Canny%2C+J.&rft.date=2007-05-01&rft.pub=IEEE&rft.isbn=9781424410477&rft.issn=0743-166X&rft.spage=875&rft.epage=883&rft_id=info:doi/10.1109%2FINFCOM.2007.107&rft.externalDocID=4215689 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0743-166X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0743-166X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0743-166X&client=summon |