An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries

被引:0
|
作者
Huafei ZHU [1 ]
机构
[1] School of Computer and Computing Science, Zhejiang University City College
关键词
adaptive adversary; multicast key distribution; pseudo-random number generator; semantic secu rity; symmetric-key encryption;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, an efficient construction of multicast key distribution schemes based on semantically secure symmetric-key encryption schemes and cryptographically strong pseudo-random number generators is presented and analyzed. The proposed scheme is provably secure against adaptive adversaries leveraging the security amplification technique defined over the logical key hierarchy structures. Our protocol tolerates any coalition of revoked users; in particular, we do not assume any limit on the size or structure of the coalition. The proposed scheme is efficient as a performance of Join or Leave procedure requires 2 log(N) multicast activities defined over a sibling ancestor node set, 2 log(N) internal state updates of the underlying pseudo-random number generator and 2 log(N) symmetric-key encryption activities for N users in a session.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 50 条
  • [2] Efficient key distribution protocol for secure multicast communication
    Kim, B
    Cho, HJ
    Lee, J
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 1007 - 1016
  • [3] Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Deborah, L. Jegatha
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 878 - 894
  • [4] A Secure Key Distribution Protocol for Multicast Communication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Subramanian, S. Siva
    [J]. CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 249 - +
  • [5] AKMP: An adaptive key management protocol for secure multicast
    Bettahar, H
    Bouabdallah, A
    Challal, Y
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 190 - 195
  • [6] An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries一种快速有效能抵抗自适应攻击的组播密钥分发协议
    Huafei Zhu
    [J]. Science China Information Sciences, 2017, 60
  • [7] Error Detection and Correction for Secure Multicast Key Distribution Protocol
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Thangam, V.
    Manoji, M.
    Vinayagam, M. S.
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, 2011, 198 : 308 - +
  • [8] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [9] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [10] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    [J]. Journal of Cryptology, 2015, 28 : 312 - 350