Multicast security: A taxonomy and some efficient constructions

R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B. Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. This approach can be regarded as a 'midpoint' between traditional message authentication codes and digital signatures. We also present an improved solution to the key revocation problem.
Original languageAmerican English
Title of host publicationINFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies
StatePublished - 1999

Bibliographical note

Place of conference:New York, NY, USA

Fingerprint

Dive into the research topics of 'Multicast security: A taxonomy and some efficient constructions'. Together they form a unique fingerprint.

Cite this