Secure multicast using proxy encryption

Yun Peng Chiu*, Chin Laung Lei, Chun-Ying Huang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

30 Scopus citations


In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one "group key" shared by all group members. However, this incurs the so-called "1 affects n problem," that is, an action of one member affects the whole group. We believe this is the source of scalability problems. Moreover, from the administrative perspective, it is desired to confine the impacts of changing membership events in a local area. In this paper, we propose a new secure multicast architecture without using a group key. We exploit a cryptographic primitive "proxy encryption." It allows routers to convert a ciphertext encrypted under a key to a ciphertext encrypted under another key, with-out revealing the secret key and the plaintext. By giving proper keys to intermediate routers, routers could provide separation between subgroups. Therefore the goals of scalability and containment are achieved.

Original languageEnglish
Title of host publicationInformation and Communications Security - 7th International Conference, ICICS 2005, Proceedings
Number of pages11
StatePublished - 1 Dec 2005
Event7th International Conference on Information and Communications Security, ICICS 2005 - Beijing, China
Duration: 10 Dec 200513 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3783 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference7th International Conference on Information and Communications Security, ICICS 2005


  • Cipher sequences
  • ElGamal cryptosystem
  • Multicast key management
  • Proxy encryption
  • Secure multicast

Fingerprint Dive into the research topics of 'Secure multicast using proxy encryption'. Together they form a unique fingerprint.

Cite this