Optimizing the rekeying cost for contributory group key agreement schemes

被引:4
|
作者
Sun, Wei Yu Yan Lindsay
Liu, K. J. Ray
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
security; key management; tree structure;
D O I
10.1109/TDSC.2007.1006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although a contributory group key agreement is a promising solution to achieve access control in collaborative and dynamic group applications, the existing schemes have not achieved the performance lower bound in terms of time, communication, and computation costs. In this paper, we propose a contributory group key agreement that achieves the performance lower bound by utilizing a novel logical key tree structure, called PFMH, and the concept of phantom user position. In particular, the proposed scheme only needs O(1) rounds of the two-party Diffie-Hellman (DH) upon any single-user join event and O(log n) rounds of the two-party DH upon any single-user leave event. Both the theoretical bound analysis and simulation show that the proposed scheme achieves a lower rekeying cost than the existing tree-based contributory group key agreement schemes.
引用
收藏
页码:228 / 242
页数:15
相关论文
共 50 条
  • [11] A time-efficient contributory key agreement scheme for secure group communications
    Sun, B
    Trappe, W
    Sun, Y
    Liu, KJR
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1159 - 1163
  • [12] Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management
    Lavanya, Raja
    Sundarakantham, K.
    Shalinie, S. Mercy
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 439 - 448
  • [13] A New Group Key Rekeying with Homomorphic Encryption
    Kim, Heeyoul
    [J]. COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS, 2012, 350 : 88 - 94
  • [14] The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network
    Chen, Yu-Yi
    Huang, Chuan-Chiang
    Jan, Jinn-Ke
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 455 - 460
  • [15] Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting"
    Tan, Chik-How
    Yang, Guomin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) : 5887 - 5888
  • [16] A lightweight group key management scheme with constant rekeying cost and public bulletin size
    Sharma, Payal
    Purushothama, B. R.
    [J]. INFORMATION SECURITY JOURNAL, 2024, 33 (02): : 97 - 120
  • [17] Group rekeying schemes for secure group communication in wireless sensor networks
    Wang, Yong
    Ramamurthy, Byrav
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3419 - 3424
  • [18] Research and implementation of group key management in batch group rekeying
    College of Mathematics and Computer Science, Anhui Normal University, Wuhu 241000, China
    [J]. Dongnan Daxue Xuebao, 2006, 3 (488-492):
  • [19] Round-optimal contributory conference key agreement
    Boyd, C
    Nieto, JMG
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 161 - 174
  • [20] Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks
    Renugadevi, N.
    Mala, C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4289 - 4307