Skip to main content
Top

2015 | OriginalPaper | Chapter

A Secure Multicast Key Agreement Scheme

Authors : Hsing-Chung Chen, Chung-Wei Chen

Published in: Information and Communication Technology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wu et al. proposed a key agreement to securely deliver a group key to group members. Their scheme utilized a polynomial to deliver the group key. When membership is dynamically changed, the system refreshes the group key by sending a new polynomial. We commented that, under this situation, the Wu et al.’s scheme is vulnerable to the differential attack. This is because that these polynomials have linear relationship. We exploit a hash function and random number to solve this problem. The secure multicast key agreement (SMKA) scheme is proposed and shown in this paper which could prevent from not only the differential attack, but also subgroup key attack. The modification scheme can reinforce the robustness of the scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, H.-C., Wang, S.-J., Wen, J.-H.: Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24), 5598–5610 (2007)CrossRef Chen, H.-C., Wang, S.-J., Wen, J.-H.: Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24), 5598–5610 (2007)CrossRef
2.
go back to reference Chen, H.-C.: Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. Secur. Commun. Netw. 6(1), 100–107 (2013)CrossRef Chen, H.-C.: Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. Secur. Commun. Netw. 6(1), 100–107 (2013)CrossRef
3.
go back to reference Chen, H.-C., Yang, C.-Y., Su, H.-K., Wei, C.-C., Lee, C.-C.: A secure E-mail protocol using ID-based FNS multicast mechanism. Comput. Sci. Inf. Syst. 11(3), 1091–1112 (2014). Special Issue on Mobile Collaboration Technologies and Internet ServicesCrossRef Chen, H.-C., Yang, C.-Y., Su, H.-K., Wei, C.-C., Lee, C.-C.: A secure E-mail protocol using ID-based FNS multicast mechanism. Comput. Sci. Inf. Syst. 11(3), 1091–1112 (2014). Special Issue on Mobile Collaboration Technologies and Internet ServicesCrossRef
4.
go back to reference Wu, K.P., Ruan, S.J., Lai, F., Tseng, C.K.: On key distribution in secure multicasting. In: Proceedings of 25th Annual IEEE International Conference on Local Computer Networks, p. 208 (2000) Wu, K.P., Ruan, S.J., Lai, F., Tseng, C.K.: On key distribution in secure multicasting. In: Proceedings of 25th Annual IEEE International Conference on Local Computer Networks, p. 208 (2000)
5.
go back to reference Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. IEEE Trans. Comput. 53(7), 905–921 (2001)CrossRef Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. IEEE Trans. Comput. 53(7), 905–921 (2001)CrossRef
6.
go back to reference Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef
7.
go back to reference Fekete, A., Lynch, N., Shvartsman, A.: Specifying and using a partionable group communication service. ACM Trans. Comput. Syst. 19(2), 171–216 (2001)CrossRef Fekete, A., Lynch, N., Shvartsman, A.: Specifying and using a partionable group communication service. ACM Trans. Comput. Syst. 19(2), 171–216 (2001)CrossRef
8.
go back to reference Chen, X., Lenzini, G., Mauw, S., Pang, J.: Design and formal analysis of a group signature based electronic toll pricing system. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 55–75 (2013) Chen, X., Lenzini, G., Mauw, S., Pang, J.: Design and formal analysis of a group signature based electronic toll pricing system. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 55–75 (2013)
9.
go back to reference Craß, S., Dönz, T., Joskowicz, G., Kühn, E., Marek, A.: Securing a space-based service architecture with coordination-driven access control. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 76–97 (2013) Craß, S., Dönz, T., Joskowicz, G., Kühn, E., Marek, A.: Securing a space-based service architecture with coordination-driven access control. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(1), 76–97 (2013)
10.
go back to reference Malik, S., Lee, J.-H.: Privacy enhancing factors in people-nearby applications. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 6(2), 113–121 (2015) Malik, S., Lee, J.-H.: Privacy enhancing factors in people-nearby applications. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 6(2), 113–121 (2015)
11.
go back to reference Kent, A.D., Liebrock, L.M., Wernicke, J.: Differentiating user authentication graphs. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 24–38 (2014) Kent, A.D., Liebrock, L.M., Wernicke, J.: Differentiating user authentication graphs. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(2), 24–38 (2014)
12.
go back to reference Moser, L.E., Amir, Y., Melliar-Smith, P.M., Agarwal, D.A.: Extended virtual synchrony. In: Proceedings of the IEEE 14th International Conference on Distributed Computing Systems, pp. 55–65 (1994) Moser, L.E., Amir, Y., Melliar-Smith, P.M., Agarwal, D.A.: Extended virtual synchrony. In: Proceedings of the IEEE 14th International Conference on Distributed Computing Systems, pp. 55–65 (1994)
13.
go back to reference Wen, J.H., Wu, M.C., Chen, T.S.: A novel elliptic curve method for secure multicast system. Far East J. Math. Sci. 28(2), 449–467 (2008)MathSciNetMATH Wen, J.H., Wu, M.C., Chen, T.S.: A novel elliptic curve method for secure multicast system. Far East J. Math. Sci. 28(2), 449–467 (2008)MathSciNetMATH
14.
go back to reference Wu, K.P., Ruan, S.J., Tseng, C.K., Lai, F.: Hierarchical access control using the secure filter. IEICE Trans. Inf. Syst. E84-D(6), 700–708 (2001) Wu, K.P., Ruan, S.J., Tseng, C.K., Lai, F.: Hierarchical access control using the secure filter. IEICE Trans. Inf. Syst. E84-D(6), 700–708 (2001)
15.
go back to reference Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH
Metadata
Title
A Secure Multicast Key Agreement Scheme
Authors
Hsing-Chung Chen
Chung-Wei Chen
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-24315-3_28

Premium Partner