Skip to main content
Top

2015 | OriginalPaper | Chapter

Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme

Authors : Byrapura Rangappa Purushothama, B. B. Amberker

Published in: Security in Computing and Communications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Designing an efficient key management scheme for secure group communication is challenging. We focus on non-tree based group key management scheme as they provide flexible and practical mechanism for collaborative computing. In this paper, we propose a non-tree based secure group key management scheme based on polynomial construction method. In the proposed scheme, an user is supposed to store only two keys (private shared key and group key). When a new user joins the group, only one encryption is required for rekeying and when an existing user leaves the group, only one polynomial construction is required for rekeying. The storage at the key distribution center is reduced in the proposed scheme. We analyze the security of the scheme and show that collusion of any subset of users cannot obtain the secret key of any non-colluded user. We compare the proposed scheme with the non-tree based schemes relying on polynomial construction method and show that the proposed scheme is efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Aho, A.V., Hopcroft, J.E., Ullman, J.D.: The Design and Analysis of Computer Algorithms. Addison-Wesley, California (1974)MATH Aho, A.V., Hopcroft, J.E., Ullman, J.D.: The Design and Analysis of Computer Algorithms. Addison-Wesley, California (1974)MATH
3.
go back to reference Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J.R., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst. 15(5), 468–480 (2004)CrossRef Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J.R., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst. 15(5), 468–480 (2004)CrossRef
4.
go back to reference Aparna, R., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manage. 20(6), 383–418 (2010)CrossRef Aparna, R., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manage. 20(6), 383–418 (2010)CrossRef
5.
go back to reference Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993) CrossRef Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993) CrossRef
6.
go back to reference Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995) CrossRef Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995) CrossRef
7.
go back to reference Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Information Security and Cryptography. Springer, Berlin (2002) CrossRef Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Information Security and Cryptography. Springer, Berlin (2002) CrossRef
8.
go back to reference Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press, New York (1978) MATH Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press, New York (1978) MATH
9.
go back to reference Kamal, A.A.: Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int. J. Netw. Secur. 15(1), 68–70 (2013) Kamal, A.A.: Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int. J. Netw. Secur. 15(1), 68–70 (2013)
10.
go back to reference Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef
11.
go back to reference Ku, W.C., Chen, S.M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 391–396, October 2003 Ku, W.C., Chen, S.M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 391–396, October 2003
12.
go back to reference Mittra, S.: Iolus: a framework for scalable secure multicasting. SIGCOMM Comput. Commun. Rev. 27(4), 277–288 (1997)CrossRef Mittra, S.: Iolus: a framework for scalable secure multicasting. SIGCOMM Comput. Commun. Rev. 27(4), 277–288 (1997)CrossRef
13.
go back to reference Molva, R., Pannetrat, A.: Scalable multicast security in dynamic groups. In: ACM Conference on Computer and Communications Security, pp. 101–112 (1999) Molva, R., Pannetrat, A.: Scalable multicast security in dynamic groups. In: ACM Conference on Computer and Communications Security, pp. 101–112 (1999)
14.
go back to reference Piao, Y., Kim, J., Tariq, U., Hong, M.: Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)MathSciNetCrossRef Piao, Y., Kim, J., Tariq, U., Hong, M.: Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)MathSciNetCrossRef
15.
go back to reference Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRef Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRef
16.
go back to reference Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)CrossRef Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)CrossRef
17.
go back to reference Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef
18.
go back to reference Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure Group Communications Over Data Networks. Springer, New York (2004). ISBN: 0387229701 Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure Group Communications Over Data Networks. Springer, New York (2004). ISBN: 0387229701
19.
go back to reference Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: 27th IEEE International Conference on Computer Communications (INFOCOM), pp. 538–546 (2008) Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: 27th IEEE International Conference on Computer Communications (INFOCOM), pp. 538–546 (2008)
Metadata
Title
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme
Authors
Byrapura Rangappa Purushothama
B. B. Amberker
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_12

Premium Partner