The Mathematics Behind Key Management in Group Communication

International Journal of Computer Science and Engineering
© 2018 by SSRG - IJCSE Journal
Volume 5 Issue 1
Year of Publication : 2018
Authors : Dr G Padmavathi

How to Cite?

Dr G Padmavathi, "The Mathematics Behind Key Management in Group Communication ," SSRG International Journal of Computer Science and Engineering , vol. 5,  no. 1, pp. 9-14, 2018. Crossref,


Secure Group Communication is a challenging task today because of many threats the Internet is facing. Many group oriented applications are upcoming because of the increased use of Internet for many personal and business applications. Maintaining the secrecy in a group communication is challenging because of group member‟s dynamism. Cryptographic keys are generated and distributed to the communicating parties for secure communication among group members to maintain the forward and backward secrecy of communication. The important overheads in secure group communication are storage efficiency and communication efficiency. The formulation of minimization of storage and communication overheads is studied and the fundamental structure for the total overheads minimization is a constraint optimization problem. This paper briefly discusses some of the existing group key distribution models. Different Virtual trees for key distribution are also discussed. The constraint optimization problem is presented with the plausible solution.


Multicast communication, group key, storage efficiency, communication efficiency, constraint optimization.


[1] Balenson D., McGrew D., and Sherman A., “Key management for large Dynamic groups: One-way function trees and amortized initialization”, IEEE Selected Areas in Communication, Special Issue on Middleware, Vol. 17, pp.1614-1631, August 1999. 
[2] Ballardie C., “Scalable Multicast Key Distribution”, RFC 1949, May 1996,
[3] Banerjee S., and Battarcharjee B., “Scalable Secure Group Communication over IP Multicast”, JSAC Special Issue on Network Support for Group Communication”, Vol. 20, No. 8, pp. 1511-1527, October 2002.
[4] Boyd C., “On Key Agreement and Conference Key Agreement”, In ACISP: Australian Conference on Information Security and Privacy, Springer-Verlag, pp. 294-302, 1997.
[5] Burmester M. V. D., and Desmedt Y., “A Secure and Efficient Conference Key Distribution System”, Advances in Cryptography –EURO CRYPT”94, Vol. 950, Lecture Notes in Computer Science, Springer-Verlag, pp.275-286, 1995. 
[6] Canetti R., Malkin T., and Nissim K., “Efficient Communication Storage tradeoffs for Multicast Encryption”, Conference Proceedings EUROCRYPT 99, PP.456-470, 1999. 
[7] Canetti R., Garay J., Itkis G., Micciianancio D., Noar M and Pinkas B., “Multicast Security: a Taxonomy and some efficient constructions”, Proceedings of IEEE INFOCOM ‟99, Vol. 2, pp. 708-716, March 1999. 
[8] Celik and A Datta, “A Scalable Approach for Subscription Based Information Commerce”, In Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, Milpitas, CA, June 2000. 
[9] Chang I., Engal R., Kandlur D., Pendarakis D and Saha D., “Key Management for Secure Internet Multicast using Boolean Minimization Techniques”, IEEE INFOCOM, New York, March 1999. 
[10] Chiou G. And Chen W., “Secure Broadcasting using Secure Lock”, IEEE Transactions on Software Engineering, Vol. 15, No. 8, pp. 929-934, August 1989. 
[11] Chung Kei Wong., Mohammed Gouda and Lam S. Simon, “Secure Group Communication using Key Graphs”, IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, February 2000.
[12] Cover T. M. and Thomas J. A., “Elements of Information Theory”, Wiley-Interscience, 1991. 
[13] Hardjono T., Cain B., and Doraswamy N., “A Framework for Group Key Management for Multicast Security,” IETF Internet draft, 1999. 
[14] Harney H. And Muckenhirn C., “Group Key Management Protocol (GKMP) Architecture”, RFC 2094, July 1997. 
[15] Indrakshi Ray and Indrajit Ray, “Using Compatible Keys for Secure Multicasting in E-Commerce”, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS‟02), 2002. 
[16] Ingemarsson I. And Tang D. T. and Wong C. K., “A Conference Key Distribution System”, IEEE Transactions on Information Theory, Vol. 28, No. 5, pp. 714-720, September 1982.
[17] Kim Y., Perrig A. and Tsudik G., “Communication Efficient Group Key Agreement”, Proceedings of IFIP SEC 2001, June 2001.
[18] Lukasz Opychal and Atul Prakash., “Secure Distribution of Events in Content-Based Publish- Subscribe Systems”, Security 2001 Conference Proceedings, pp. 281-296, 2001. 
[19] Mathew J. Moyer, Josyula R. Rao and Pankaj Rohtagi, “A Survey of Security Issues in Multicast Communications”, IEEE Network, pp. 12-23, November/December 1999. 
[20] McGrew d. A., AND Sherman A. T., “Key Establishment in Large Dynamic Groups using One-Way Function Trees”, Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, 1998. 
[21] Michael Steiner, Gene Tsudik and Michael Waidner., “Cliques: A New Approach to Group Key Agreement”, Proceedings of IEEE International Conference on Distributed Computer Systems, May 1998.
[22] Mingyan Li., Poovendran R., and Berenstein C., “Optimization of Key Storage for Secure Multicast”, Proceedings of 2001 Conference on Information Sciences and Systems, 2001. 
[23] Mingyan Li., Poovendran R., and Berenstein C., “Design of Secure Multicast Key Management Schemes with Communication Budget Constraint”, IEEE Communications Letters, Vol. 6, No. 3, pp. 108-110, 2002.
[24] Oppliger R., and Albenese A., “Distributed Registration and Key Distribution (DiRK)”, 12th International Conference on Information Security, 1996. 
[25] Perrig A., Song D. and Tygar., “ELK, A New Protocol for Efficient Large Group Key Distribution”, Proceedings of IEEE Symposium on Security and Privacy, pp. 247-262, 2001. 
[26] Peyravian M., Matyas S. M., Zunic N., “Decentralized Group Key Management for Secure Multicast Communications”, Computer Communications, Vol. 22, pp. 1183-1187, 1999.
[27] Radha Poovendran., John S. Baras., “An Information Theoretic Approach for Design and Analysis of Rooted Tree Multicast Key Management Schemes”, IEEE Transactions on Information Theory, Vol. 47, No. 7, pp. 2824-2835, November 2001. 
[28] Ralph Wittmann., Martina Zitterbart., “Multicast Communication Protocols and Applications”, Morgan Kaufman Publishers, 2001. 
[29] Stenier M., Tsudik G. And Waidner M., “Diffie-Hellman Key Distribution Extended to Group Communication”, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New York, pp. 31-37, 1996. 
[30] Stenier M., Tsudik G. And Waidner M., “Key Agreement in Dynamic Peer Groups”, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 8, pp. 769-780, August 2000. 
[31] Sun B., Trappe W., Sun Y. And Liu K. J. R., “A Time Efficient Contributory Key Agreement Scheme for Secure Group Communications”, Proceedings of IEEE International Conference on Communication, Vol. 2, pp. 1159-1163, 2002.
[32] Sun B., Trappe W., Sun Y. And Liu K. J. R., “A Efficient Key Management Scheme for Secure Wireless Multicast”, Proceedings of IEEE International Conference on Communication, Vol. 2, pp. 1236-1240, 2002. 
[33] Suvo Mittra., “Iolus: A Framework for Scalable Secure Multicasting”, Proceedings of ACM SIGCOMM, pp. 277-288, 1997. 
[34] Tsudik G., Kim Y., Perrig A., “Simple and Fault Tolerant Key Agreement for Dynamic Collaborative Groups”, Proceedings of the 7th ACM Conference on Computer and Communications Security, November 2000.
[35] Wade Trappe., Jie Song., Radha Poovendran., ray Liu K. J., “Key Distribution for Secure Multimedia Multicasts via Data Embedding”, Proceedings of IEEE Conference ICASSP‟01, pp. 1449-1452, May 2001.
[36] Wade Trappe., Wang Y., and Liu K. J. R., “Establishment of Conference Keys in Heterogeneous Networks”, Proceedings of IEEE International Conference on Communications, Vol. 4, pp. 2201-2205, 2002.
[37] Wade Trappe., Jie Song., Radha Poovendran., Ray Liu K. J., “Key Management and Distribution for Secure Multimedia Multicast”, IEEE Transactions on Multimedia, Vol. 5, No. 4, pp. 544-557, 2003. 
[38] Wallner D. M., Harder E. C., Agee R. C., “Key Management for Multicast: Issues and Architectures”, Internet Draft, , 1998.