Multicast Security: A Taxonomy and Some Efficient Constructions

Abstract

Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast; in particular, known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a ‘midpoint’ between traditional Message Authentication Codes and digital signatures. We also present an improved solution to the key revocation problem.

DOI: 10.1109/INFCOM.1999.751457
View Slides

Extracted Key Phrases

4 Figures and Tables

050'99'01'03'05'07'09'11'13'15'17
Citations per Year

908 Citations

Semantic Scholar estimates that this publication has 908 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@inproceedings{Canetti1999MulticastSA, title={Multicast Security: A Taxonomy and Some Efficient Constructions}, author={Ran Canetti and Juan A. Garay and Gene Itkis and Daniele Micciancio and Moni Naor and Benny Pinkas}, booktitle={INFOCOM}, year={1999} }