By Topic

Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Wentao Zhu ; State Key Lab. of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing

We address the problem of distributing a confidentially shared session key to a multimedia multicast group for content protection. In two such schemes proposed by Trappe , the session key is distributed by employing a homogenized rekey message format. We show that their rekey algorithm in itself is vulnerable to specialized collision attacks, in which even a completely passive outer adversary, who never joins the system and thus never knows any secret user keys, can still reveal the session key of the multimedia multicast with an observable probability but only involving a time complexity far lower than an exhaustive search.

Published in:

Multimedia, IEEE Transactions on  (Volume:11 ,  Issue: 3 )