Efficient communication-storage tradeoffs for multicast encryption

Ran Canetti, Tal Malkin, Kobbi Nissim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider re-keying protocols for secure multicasting in a dynamic multicast group with a center. There is a variety of diffierent scenarios using multicast, presenting a wide range of efficiency requirements with respect to several parameters. We give an upper bound on the tradeoff between storage and communication parameters. In particular, we suggest an improvement of the schemes by Wallner et al. and Wong et al. [13,14] with sub-linear center storage, without a significant loss in other parameters. Correctly selecting the parameters of our scheme we can eficiently accommodate a wide range of scenarios. This is demonstrated by Applying the protocol to some known benchmark scenarios. We also show lower bounds on the tradeoff between communication and user storage, and show that our scheme is almost optimal with respect to these lower bounds.

Original languageEnglish
Title of host publicationAdvances in Cryptology – EUROCRYPT 1999 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsJacques Stern
PublisherSpringer Verlag
Pages459-474
Number of pages16
ISBN (Print)3540658890, 9783540658894
DOIs
StatePublished - 1999
Externally publishedYes
Event7th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999 - Prague, Czech Republic
Duration: 2 May 19996 May 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1592
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999
Country/TerritoryCzech Republic
CityPrague
Period2/05/996/05/99

Fingerprint

Dive into the research topics of 'Efficient communication-storage tradeoffs for multicast encryption'. Together they form a unique fingerprint.

Cite this