Multi-level secure multicast: The rethinking of secure locks

被引:7
|
作者
Scheikl, O [1 ]
Lane, J [1 ]
Boyer, R [1 ]
Eltoweissy, M [1 ]
机构
[1] James Madison Univ, Dept Comp Sci, Harrisonburg, VA 22807 USA
关键词
D O I
10.1109/ICPPW.2002.1039707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secure multicast environment, the distribution of cryptographic keys may be a primary indicator of system performance. The mathematics of public key cryptography do not scale well especially for large multi-user networks, and a symmetric-key-based system is not feasible over a network spread out geographically. The problems become even more complicated when we begin dealing with multiple levels of security, i.e. different classification levels of traffic as well as group memberships/permissions. In this paper, we present a new approach to multi-level secure multicast, one that uses the secure lock encryption scheme based on the mathematics of the Chinese Remainder Theorem to distribute keys to various subgroups. Our solution can be applied to both one-to-many and many-to-many group communications. In addition, it presents a viable solution for the distribution of one-time session keys during actual message transmission.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [1] A Multi-Level Secure File Sharing Server and its Application to a Multi-Level Secure Cloud
    Heckman, Mark R.
    Schell, Roger R.
    Reed, Edwards E.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1224 - 1229
  • [2] Multi-Level Secure JTAG Architecture
    Pierce, Luke
    Tragoudas, Spyros
    2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2011,
  • [3] A Multi-Level Approach to More Secure Memorization
    Dickinson, Stefanie
    COLLEGE MUSIC SYMPOSIUM, 2009, 49-50 : 271 - 283
  • [4] Rethinking of iolus: Constructing the secure multicast infrastructures
    Zhu, WT
    Li, JS
    Hong, PL
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 895 - 904
  • [5] Secure multi-level threshold multi-secret sharing
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2007, 4 (592-594):
  • [6] Multi-level design validation in a secure embedded system
    Hwang, DD
    Schaumont, P
    Yang, SL
    Verbauwhede, I
    HLDVT'05: TENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2005, : 203 - 210
  • [7] Reducing the risk of multi-level secure (MLS) workstations
    Klinker, JE
    Mihelcic, DM
    MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1422 - 1426
  • [8] Secure Multi-Source Multicast
    Cohen, Alejandro
    Cohen, Asaf
    Medard, Muriel
    Gurewitz, Omer
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (01) : 708 - 723
  • [9] MLS/SDM: Multi-level secure spatial data model
    Oh, YF
    Bae, HY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 222 - 229
  • [10] A model theoretic semantics for multi-level secure deductive databases
    Jamil, HM
    Dobbie, G
    LOGICS PROGRAMMING, PROCEEDINGS, 2002, 2401 : 130 - 147