Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Multicast over Mutual Transport Layer Security: A Practical Design for Identity-Bound Group Distribution

View through CrossRef
Abstract Group communication remains a missing primitive in production deployments that rely on mutual Transport Layer Security. The traditional point-to- point model of mutual authentication provides strong assurances about who is at each end of a connection, yet it scales poorly when a publisher must fan out the same content to thousands of authenticated receivers. Network-layer multicast[1] is rarely available across administrative domains, application-layer overlays are often built as best-effort trees with ad hoc security, and many designs end up replicating the payload per subscriber with separate handshakes, keys, and record layers. This paper investigates how to build multicast semantics[2] while retaining the operational and cryptographic properties that operators expect from mutual Transport Layer Security. We present an architecture that uses mutual authentication exclu- sively for the control plane and for the distribution of short-lived, audience-scoped group keys, while the data plane carries a single copy of the payload per edge and achieves replication with zero-copy fan-out. The result preserves identity-binding and revocation semantics, integrates with existing service meshes and certificate-based identities, and reduces publisher cost by removing redundant record-layer work. We describe the design choices that make this practical: audience definition in terms of verifiable identities rather than opaque channels, key derivation bound to group epochs, exporter-based tie-ins to the mutual Transport Layer Security session without exposing handshake secrets, and regional distributors that terminate authentication but do not see plaintext outside a narrow trust boundary. We implement these as sidecars that attach to existing gateways and propose operational guardrails around cer- tificate rotation, revocation stapling, and churn-aware rekeying[2][3]. We evaluate the approach with a set of synthetic and trace-driven experiments that stress group size, churn, and packet loss. The evaluation focuses on tail latency, publisher CPU cost, rekey convergence, and delivery under adverse conditions. The results indicate that the proposed design retains the safety properties of mutual Transport Layer Security while delivering the throughput characteristics of multicast overlays. Median and tail latencies remain stable as groups scale into the thousands, publisher cost grows sublinearly with the number of receivers, and rekey operations converge deterministically even under heavy membership churn. We conclude that multicast over mutual Transport Layer Security is not an oxymoron but a feasible and useful pattern when the control and data planes are separated, identities are first-class, and group state is managed with short epochs and verifiable updates.
Title: Multicast over Mutual Transport Layer Security: A Practical Design for Identity-Bound Group Distribution
Description:
Abstract Group communication remains a missing primitive in production deployments that rely on mutual Transport Layer Security.
The traditional point-to- point model of mutual authentication provides strong assurances about who is at each end of a connection, yet it scales poorly when a publisher must fan out the same content to thousands of authenticated receivers.
Network-layer multicast[1] is rarely available across administrative domains, application-layer overlays are often built as best-effort trees with ad hoc security, and many designs end up replicating the payload per subscriber with separate handshakes, keys, and record layers.
This paper investigates how to build multicast semantics[2] while retaining the operational and cryptographic properties that operators expect from mutual Transport Layer Security.
We present an architecture that uses mutual authentication exclu- sively for the control plane and for the distribution of short-lived, audience-scoped group keys, while the data plane carries a single copy of the payload per edge and achieves replication with zero-copy fan-out.
The result preserves identity-binding and revocation semantics, integrates with existing service meshes and certificate-based identities, and reduces publisher cost by removing redundant record-layer work.
We describe the design choices that make this practical: audience definition in terms of verifiable identities rather than opaque channels, key derivation bound to group epochs, exporter-based tie-ins to the mutual Transport Layer Security session without exposing handshake secrets, and regional distributors that terminate authentication but do not see plaintext outside a narrow trust boundary.
We implement these as sidecars that attach to existing gateways and propose operational guardrails around cer- tificate rotation, revocation stapling, and churn-aware rekeying[2][3].
We evaluate the approach with a set of synthetic and trace-driven experiments that stress group size, churn, and packet loss.
The evaluation focuses on tail latency, publisher CPU cost, rekey convergence, and delivery under adverse conditions.
The results indicate that the proposed design retains the safety properties of mutual Transport Layer Security while delivering the throughput characteristics of multicast overlays.
Median and tail latencies remain stable as groups scale into the thousands, publisher cost grows sublinearly with the number of receivers, and rekey operations converge deterministically even under heavy membership churn.
We conclude that multicast over mutual Transport Layer Security is not an oxymoron but a feasible and useful pattern when the control and data planes are separated, identities are first-class, and group state is managed with short epochs and verifiable updates.

Related Results

Large-Scale Multicast Group Secure Transmission Scheme Based on Multi-Carrier FDA
Large-Scale Multicast Group Secure Transmission Scheme Based on Multi-Carrier FDA
Aiming at the problem that the traditional physical layer technology cannot realize secure transmission due to the large number of users and wide dispersion in the multicast system...
A Multicast Sparse-Grooming Algorithm Based on Network Coding in WDM Networks
A Multicast Sparse-Grooming Algorithm Based on Network Coding in WDM Networks
AbstractTo improve the limited number of wavelength utilization and decrease the traffic blocking probability in sparse-grooming wavelength-division multiplexing (WDM) networks, a ...
A Central-Controllable and Secure Multicast System for Universal Identifier Network
A Central-Controllable and Secure Multicast System for Universal Identifier Network
In recent years, many institutes and organizations have been made efforts into developing new networkarchitecture. Universal Identifier Network(UIN) is one of them ...
Młodociani sprawcy przestępstw przeciwko mieniu
Młodociani sprawcy przestępstw przeciwko mieniu
The new Polish penal legislation of 1969 introduced special rules of criminal liability of young adult offenders' aged 17-20. In 1972 criminological research was undertaken in orde...
Design
Design
Conventional definitions of design rarely capture its reach into our everyday lives. The Design Council, for example, estimates that more than 2.5 million people use design-related...
Maximum-Lifetime Least-Cost Multicasting in MANETs based on Heuristic Genetic Algorithm
Maximum-Lifetime Least-Cost Multicasting in MANETs based on Heuristic Genetic Algorithm
All nodes in a mobile ad hoc network are usually powered by limited battery energy. The consideration of multicast lifetime in mobile ad hoc network prevents the problem of rapid d...
ONE- VERSUS TWO-LAYER CLOSURE AT CESAREAN BIRTH
ONE- VERSUS TWO-LAYER CLOSURE AT CESAREAN BIRTH
Background: Cesarean delivery is one of the most commonly performed surgical procedures worldwide. The technique of uterine closure plays a significant role in postoperative recove...
GUIDING PRINCIPLES OF PRIORITIZING TASKS FOR DEVELOPING UKRAINE'S WATER TRANSPORT
GUIDING PRINCIPLES OF PRIORITIZING TASKS FOR DEVELOPING UKRAINE'S WATER TRANSPORT
Topicality. Water transport is of crucial importance for the economic prosperity and national security of Ukraine. Most sectors of the economy depend on water transport and its inf...

Back to Top