Multicast security: A taxonomy and some efficient constructions

Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. This approach can be regarded as a'midpoint' between traditional message authentication codes and digital signatures. We also present an improved solution to the key revocation problem.

Original languageEnglish
Title of host publicationProceedings - IEEE INFOCOM'99
Subtitle of host publicationThe Conference on Computer Communications - 18th Annual Joint Conference of the IEEE Computer and Communications Societies: The Future is Now
Pages708-716
Number of pages9
DOIs
StatePublished - 1999
Externally publishedYes
Event18th Annual Joint Conference of the IEEE Computer and Communications Societies: The Future is Now, IEEE INFOCOM'99 - New York, NY, United States
Duration: 21 Mar 199125 Mar 1991

Publication series

NameProceedings - IEEE INFOCOM
Volume2
ISSN (Print)0743-166X

Conference

Conference18th Annual Joint Conference of the IEEE Computer and Communications Societies: The Future is Now, IEEE INFOCOM'99
Country/TerritoryUnited States
CityNew York, NY
Period21/03/9125/03/91

Fingerprint

Dive into the research topics of 'Multicast security: A taxonomy and some efficient constructions'. Together they form a unique fingerprint.

Cite this