Vol.3 No.7 (October 2013)
Group Key Management Based on B-Tree and LKH
The existing secure group schemes had following shortages: 1) Individual has to maintain large amount of keys with increasing number of users; 2) There will be too many key renew process affecting the efficiency. This paper proposes an efficient group key management scheme based on B-Tree and LKH, which can add branches into the tree when new members join in order to impose restrictions on height of tree, and reduce the number of stored key. In this scheme, the group key will be renewed when the secure group members join or quit in order to provide a safe multicast module. This scheme overcomes the above defects and improves the performance under large group size, and could appropriately be applied on large and dynamic multicast groups.
刘迪 , 周昕 , 李晖 , 徐超 (2013) 基于LKH树和B树的组密钥管理方案。 计算机科学与应用， 3， 302-306. doi: 10.12677/CSA.2013.37053
 S. Rafaeli, D. Hutchison. A survey of key management for se- cure group communication. ACM Computing Surveys, 2003, 35(3): 309-329.
 M. Hajyvahabzadeh, E. Eidkhani, S. A. Mortazavi and A. N. Pour. A new group key management protocol using code for key cal- culation: CKC. IEEE, 2010.
 S. Anahita Mortazavi, A. N. Pour and T. Kato. An efficient dis- tributed group key management using hierarchical approach with diffie-Hellman and symmetric algo-rithm: DHSA. IEEE, 2011.
 H. R. Hassen, H. Bettahar, A. Bouadbdallah and Y. Challal. An efficient key management scheme for content access control for linear hierarchies. Computer Networks, 2012, 56: 2107-2118.
 R. Velumadhava Rao, K. Selvamani and R. Elak-kiya. A secure key transfer protocol for group communication. Ad-vanced Com- puting: An International Journal (ACIJ), 2012, 3(6): 83-90.
 Y.-R. Chen, W.-G. Tzeng. Efficient and provably-secure group key management scheme using key derivation. IEEE 11th Inter- national Conference on Trust, Security and Computing and Communi-cations, 2012.
 D. Wallne, E. Harder and R. Agee. Key manage-ment for mul- ticast: Issues and architectures. National Security Agency, RFC2627, 1999.
 D. Je, S. Seo, Y. Park and J. Lee. Computation and storage effi- cient key tree management protocol for secure multicast com- munications. Computer Communications, El-sevier, 2009.
 B. Jiang, X. Hu. A survey of group key manage-ment. Interna- tional Conference on Computer Science and Software Engi- neering, 2008: 994-1002.
 Z. He and Y. Li. Dynamic key management in a user hierarchy. 2nd International Conference on Anti-Counterfeiting, Security and Identification, 2008: 298-300.
 Y. Piao, et al. Polynomial-based key management for secure intra-group and inter-group communication. Computers and Ma- thematics with Applications, 2012.
 D. Balenson, D. McGrew and A. Sherman. Key management for large dynamic groups: One-way functions trees and amortized initialization. IETF Internet Draft, 1999.
 D. A. McGrew, A. T. Sherman. Key establishment in large dy- namic groups using one-way function trees. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.