A DC programming approach for solving a centralized group key management problem

Springer Science and Business Media LLC - Tập 44 - Trang 3165-3193 - 2022
Hoai An Le Thi1,2, Thi Tuyet Trinh Nguyen1, Hoang Phuc Hau Luu1
1LGIPM, Département IA, Université de Lorraine, Metz, France
2Institut Universitaire de France (IUF), Paris, France

Tóm tắt

A single trusted entity known as a Key Server is in charge of key generation, distribution, and management in centralized key management schemes. To prevent eavesdropping and protect the exchange content, a group key is used to encrypt the group communication. This management mechanism is typically based on a binary tree structure. When the membership of a group changes dynamically, the group key must be changed, triggering a certain updated cost. This paper addresses an important problem in centralized dynamic group key management. It consists in finding a set of leaf nodes in a binary key tree to insert new members with minimal insertion cost and keeping the tree as balanced as possible. The two mentioned important objectives are combined into a unified (deterministic) optimization model whose objective function contains discontinuous step functions with binary variables, which is known to be NP-hard. We then reformulate the problem as a combinatorial optimization program with continuous objective by introducing new binary variables. Applying penalty techniques, it results in a standard DC (Difference of Convex functions) program that can be solved efficiently by DCA (DC algorithm). Besides, the insertion nodes must be the leaf nodes, we introduce a two-step algorithm to reduce the model complexity: the first is to find the set of leaf nodes, while the second is to solve the simplified optimization problem. Numerical experiments have been studied intensively to justify the merit of our proposed model as well as the corresponding DCA.

Tài liệu tham khảo

Elhoseny M, Elminir H, Riad A et al (2016) A secure data routing schema for wsn using elliptic curve cryptography and homomorphic encryption. J King Saud Univ - Comput Inf Sci 28(3):262–275 Fukushima K, Kiyomoto S, Tanaka T et al (2008) Optimization of group key management structure with a client join-leave mechanism. Inf Process Manag 16:130–141 ISO/IEC:11770-5 (2011) Information technology - Security techniques - Key management - Part 5: Group key management Je DH, Kim HS, Choi YH et al (2014) Dynamic configuration of batch rekeying interval for secure multicast service. In: 2014 International Conference on Computing. Networking and Communications (ICNC), IEEE, pp 26–30 Kumar V, Kumar R, Pandey SK (2020) A computationally efficient centralized group key distribution protocol for secure multicast communications based upon rsa public key cryptosystem. J King Saud Univ - Comput Inf Sci 32(9):1081–1094 Le Thi HA, Pham Dinh T (2005) The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann Oper Res 133(1–4):23–46 Le Thi HA, Pham Dinh T (2018) DC programming and DCA: thirty years of developments. Math Program, Special Issue: DC Programming - Theory, Algorithms and Applications 169(1):5–68 Le Thi HA, Phan DN, Pham Dinh T (2021) DCA based approaches for bi-level variable selection and application for estimate multiple sparse covariance matrices. Neurocomputing 466:162–177 Li XS, Yang YR, Gouda MG, et al (2001) Batch rekeying for secure group communications. In: Proceedings of the 10th international conference on World Wide Web, pp 525–534 Morales L, Sudborough I, Eltoweissy M, et al (2003) Combinatorial optimization of multicast key management. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, DOI 10.1109/HICSS.2003.1174906, 9 pages Moyer MJ, Rao J, Rohatgi P (1999) Maintaining Balanced Key Trees for Secure Multicast. Internet-Draft draft-irtf-smug-key-tree-balance-00, Internet Engineering Task Force, https://datatracker.ietf.org/doc/html/draft-irtf-smug-key-tree-balance-00, 16 pages Ng WHD, Howarth M, Sun Z et al (2007) Dynamic balanced key tree management for secure multicast communications. IEEE Trans Comput 56(5):590–605 Pegueroles J, Rico-Novella F (2003) Balanced batch lkh: new proposal, implementation and performance evaluation. In: Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, IEEE, pp 815–820 Pham Dinh T, Le Thi HA (1997) Convex analysis approach to DC programming: theory, algorithms and applications. Acta Math Vietnam 22(1):289–355 Pham Dinh T, Le Thi HA (1998) A DC optimization algorithm for solving the trust-region subproblem. SIAM J Optim 8(2):476–505 Pham Dinh T, Le Thi HA (2014) Recent advances in DC programming and DCA. Transactions on computational intelligence XIII pp 1–37 Pham Dinh T, Nguyen CN, Le Thi HA (2010) An efficient combined DCA and B &B using DC/SDP relaxation for globally solving binary quadratic programs. J Glob Optim 48(4):595–632 Rudin W (1964) Principles of mathematical analysis, vol 3. McGraw-hill, New York Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29(5):444–458 Vasudev C (2006) Graph theory with applications. New Age International, India Vijayakumar P, Bose S, Kannan A (2012) Rotation based secure multicast key management for batch rekeying operations. Netw Sci 1(1–4):39–47 Wallner D, Harder E, Agee R et al (1999) Key management for multicast: Issues and architectures. Tech. rep, RFC, p 2627 Wong CK, Gouda M, Lam SS (2000) Secure group communications using key graphs. IEEE ACM Trans Netw 8(1):16–30 Yang YR, Li XS, Zhang XB, et al (2001) Reliable group rekeying: a performance analysis. In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp 27–38 Zhang XB, Lam SS, Lee DY et al (2003) Protocol design for scalable and reliable group rekeying. IEEE ACM Trans Netw 11(6):908–922