An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries

被引:0
|
作者
Huafei ZHU [1 ]
机构
[1] School of Computer and Computing Science, Zhejiang University City College
关键词
adaptive adversary; multicast key distribution; pseudo-random number generator; semantic secu rity; symmetric-key encryption;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, an efficient construction of multicast key distribution schemes based on semantically secure symmetric-key encryption schemes and cryptographically strong pseudo-random number generators is presented and analyzed. The proposed scheme is provably secure against adaptive adversaries leveraging the security amplification technique defined over the logical key hierarchy structures. Our protocol tolerates any coalition of revoked users; in particular, we do not assume any limit on the size or structure of the coalition. The proposed scheme is efficient as a performance of Join or Leave procedure requires 2 log(N) multicast activities defined over a sibling ancestor node set, 2 log(N) internal state updates of the underlying pseudo-random number generator and 2 log(N) symmetric-key encryption activities for N users in a session.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 50 条
  • [41] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [42] Efficient public-key cryptosystems provably secure against active adversaries
    Paillier, P
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 165 - 179
  • [43] Optimal Key Distribution Scheme for Secure Multicast Group Communication
    Zhou, Zhibin
    Huang, Dijiang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [44] Secure Multicast Group Management and Key Distribution in IEEE 802.21
    Hanatani, Yoshikazu
    Ogura, Naoki
    Ohba, Yoshihiro
    Chen, Lidong
    Das, Subir
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 227 - 243
  • [45] Key distribution scheme based on genetic algorithm in secure multicast
    Xu, Q.
    Zhao, H.
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (03):
  • [46] A novel key management and distribution solution for secure video multicast
    Yin, H
    Chu, XW
    Lin, C
    Qiu, F
    Min, GY
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 246 - 257
  • [47] Reliable Key Distribution for Secure Multicast by SRDP-Sign
    Tommasi, Franco
    Molendini, Simone
    Scialpi, Elena
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON ADVANCES IN FUTURE INTERNET, 2009, : 12 - 17
  • [48] Logical key tree based secure multicast protocol with copyright protection
    Chen, WT
    Hsu, HL
    Chiang, JL
    [J]. 19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 279 - 284
  • [49] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng, Tao
    Liu, Yuan-Yuan
    Ma, Jian-Feng
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [50] Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks
    Devi, D. Suganya
    Padmavathi, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 64 - 69