@inproceedings{0bc16fb3e7bb4057a016cee2d568310a,
title = "Secure multicast using proxy encryption",
abstract = "In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one {"}group key{"} shared by all group members. However, this incurs the so-called {"}1 affects n problem,{"} that is, an action of one member affects the whole group. We believe this is the source of scalability problems. Moreover, from the administrative perspective, it is desired to confine the impacts of changing membership events in a local area. In this paper, we propose a new secure multicast architecture without using a group key. We exploit a cryptographic primitive {"}proxy encryption.{"} It allows routers to convert a ciphertext encrypted under a key to a ciphertext encrypted under another key, with-out revealing the secret key and the plaintext. By giving proper keys to intermediate routers, routers could provide separation between subgroups. Therefore the goals of scalability and containment are achieved.",
keywords = "Cipher sequences, ElGamal cryptosystem, Multicast key management, Proxy encryption, Secure multicast",
author = "Chiu, {Yun Peng} and Lei, {Chin Laung} and Chun-Ying Huang",
year = "2005",
month = dec,
day = "1",
doi = "10.1007/11602897_24",
language = "English",
isbn = "3540309349",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "280--290",
booktitle = "Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings",
note = "null ; Conference date: 10-12-2005 Through 13-12-2005",
}