Efficient re-keying scheme for group key distribution

被引:0
|
作者
Jiang, Yixin [1 ]
Shi, Minghui [1 ]
Shen, Xuemin [1 ]
Lin, Chuang [2 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
group key management; re-keying; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a communication-efficient re-keying scheme by using a polynomial-based efficient code method. Compared with the previous schemes, the re-keying cost is significantly reduced, since no extra re-keying message header is needed. In addition, the computation overhead is also lightweight since only 2logn hash operations are required for each re-keying. Therefore, the proposed scheme is more suitable for deploying in the group application scenarios with both high dynamic memberships and limited communication channel capacity.
引用
收藏
页码:2639 / +
页数:2
相关论文
共 50 条
  • [21] A proposal and its evaluations of a Re-keying method for dynamic secure group communications
    Park, M
    Okazaki, N
    Seno, S
    Kashima, K
    Oshima, K
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 43 - 48
  • [22] Provably secure counter mode with related-key-based internal re-keying
    Evgeny K. Alekseev
    Kirill S. Goncharenko
    Grigory B. Marshalko
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 285 - 294
  • [23] Provably secure counter mode with related-key-based internal re-keying
    Alekseev, Evgeny K.
    Goncharenko, Kirill S.
    Marshalko, Grigory B.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (04) : 285 - 294
  • [24] Leakage-Resilient Symmetric Encryption via Re-keying
    Abdalla, Michel
    Belaid, Sonia
    Fouque, Pierre-Alain
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 471 - 488
  • [25] Re-Keying Mechanism for TinySec using ECC and Hash Chains
    Iqbal, Ummer
    Intikhab, Sana
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [26] Keying material based key pre-distribution scheme
    Liu, Zhihong
    Ma, Jianfeng
    Huang, Qiping
    Moon, SangJae
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 218 - +
  • [27] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Pei Cao
    Chi Zhang
    Xiang-Jun Lu
    Hai-Ning Lu
    Da-Wu Gu
    Journal of Computer Science and Technology, 2023, 38 : 1132 - 1148
  • [28] Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
    Udvarhelyi, Balazs
    Bronchain, Olivier
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 168 - 183
  • [29] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [30] Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
    Dziembowski, Stefan
    Faust, Sebastian
    Herold, Gottfried
    Journault, Anthony
    Masny, Daniel
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 272 - 301