Skip to main content

2015 | OriginalPaper | Buchkapitel

Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme

verfasst von : Byrapura Rangappa Purushothama, B. B. Amberker

Erschienen in: Security in Computing and Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Designing an efficient key management scheme for secure group communication is challenging. We focus on non-tree based group key management scheme as they provide flexible and practical mechanism for collaborative computing. In this paper, we propose a non-tree based secure group key management scheme based on polynomial construction method. In the proposed scheme, an user is supposed to store only two keys (private shared key and group key). When a new user joins the group, only one encryption is required for rekeying and when an existing user leaves the group, only one polynomial construction is required for rekeying. The storage at the key distribution center is reduced in the proposed scheme. We analyze the security of the scheme and show that collusion of any subset of users cannot obtain the secret key of any non-colluded user. We compare the proposed scheme with the non-tree based schemes relying on polynomial construction method and show that the proposed scheme is efficient.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Aho, A.V., Hopcroft, J.E., Ullman, J.D.: The Design and Analysis of Computer Algorithms. Addison-Wesley, California (1974)MATH Aho, A.V., Hopcroft, J.E., Ullman, J.D.: The Design and Analysis of Computer Algorithms. Addison-Wesley, California (1974)MATH
3.
Zurück zum Zitat Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J.R., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst. 15(5), 468–480 (2004)CrossRef Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J.R., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst. 15(5), 468–480 (2004)CrossRef
4.
Zurück zum Zitat Aparna, R., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manage. 20(6), 383–418 (2010)CrossRef Aparna, R., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manage. 20(6), 383–418 (2010)CrossRef
5.
Zurück zum Zitat Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993) CrossRef Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993) CrossRef
6.
Zurück zum Zitat Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995) CrossRef Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995) CrossRef
7.
Zurück zum Zitat Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Information Security and Cryptography. Springer, Berlin (2002) CrossRef Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Information Security and Cryptography. Springer, Berlin (2002) CrossRef
8.
Zurück zum Zitat Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press, New York (1978) MATH Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press, New York (1978) MATH
9.
Zurück zum Zitat Kamal, A.A.: Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int. J. Netw. Secur. 15(1), 68–70 (2013) Kamal, A.A.: Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int. J. Netw. Secur. 15(1), 68–70 (2013)
10.
Zurück zum Zitat Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)CrossRef
11.
Zurück zum Zitat Ku, W.C., Chen, S.M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 391–396, October 2003 Ku, W.C., Chen, S.M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 391–396, October 2003
12.
Zurück zum Zitat Mittra, S.: Iolus: a framework for scalable secure multicasting. SIGCOMM Comput. Commun. Rev. 27(4), 277–288 (1997)CrossRef Mittra, S.: Iolus: a framework for scalable secure multicasting. SIGCOMM Comput. Commun. Rev. 27(4), 277–288 (1997)CrossRef
13.
Zurück zum Zitat Molva, R., Pannetrat, A.: Scalable multicast security in dynamic groups. In: ACM Conference on Computer and Communications Security, pp. 101–112 (1999) Molva, R., Pannetrat, A.: Scalable multicast security in dynamic groups. In: ACM Conference on Computer and Communications Security, pp. 101–112 (1999)
14.
Zurück zum Zitat Piao, Y., Kim, J., Tariq, U., Hong, M.: Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)MathSciNetCrossRef Piao, Y., Kim, J., Tariq, U., Hong, M.: Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)MathSciNetCrossRef
15.
Zurück zum Zitat Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRef Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRef
16.
Zurück zum Zitat Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)CrossRef Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)CrossRef
17.
Zurück zum Zitat Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef
18.
Zurück zum Zitat Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure Group Communications Over Data Networks. Springer, New York (2004). ISBN: 0387229701 Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure Group Communications Over Data Networks. Springer, New York (2004). ISBN: 0387229701
19.
Zurück zum Zitat Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: 27th IEEE International Conference on Computer Communications (INFOCOM), pp. 538–546 (2008) Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: 27th IEEE International Conference on Computer Communications (INFOCOM), pp. 538–546 (2008)
Metadaten
Titel
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme
verfasst von
Byrapura Rangappa Purushothama
B. B. Amberker
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_12