Optimizing the rekeying cost for contributory group key agreement schemes

被引:4
|
作者
Sun, Wei Yu Yan Lindsay
Liu, K. J. Ray
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
security; key management; tree structure;
D O I
10.1109/TDSC.2007.1006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although a contributory group key agreement is a promising solution to achieve access control in collaborative and dynamic group applications, the existing schemes have not achieved the performance lower bound in terms of time, communication, and computation costs. In this paper, we propose a contributory group key agreement that achieves the performance lower bound by utilizing a novel logical key tree structure, called PFMH, and the concept of phantom user position. In particular, the proposed scheme only needs O(1) rounds of the two-party Diffie-Hellman (DH) upon any single-user join event and O(log n) rounds of the two-party DH upon any single-user leave event. Both the theoretical bound analysis and simulation show that the proposed scheme achieves a lower rekeying cost than the existing tree-based contributory group key agreement schemes.
引用
收藏
页码:228 / 242
页数:15
相关论文
共 50 条
  • [31] Elliptic curve based dynamic contributory group key agreement protocol for secure group communication over ad-hoc networks
    Naresh, Vankamamidi Srinivasa
    Murthy, Nistala V.E.S.
    [J]. International Journal of Network Security, 2015, 17 (05) : 588 - 596
  • [32] Contributory group key exchange in the presence of malicious participants
    Bresson, E.
    Manulis, M.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 85 - 93
  • [33] Asymmetric Group Key Agreement
    Wu, Qianhong
    Mu, Yi
    Susilo, Willy
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 153 - 170
  • [34] Deniable group key agreement
    Bohli, Jens-Matthias
    Steinwandt, Rainer
    [J]. PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 298 - +
  • [35] AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES
    Lee, Cheng-Chi
    Li, Chun-Ta
    Huang, Kuo-You
    Huang, Shiow-Yuan
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2011, 20 (04) : 697 - 707
  • [36] A new method for constructing key agreement schemes
    Sidel'nikov, V. M.
    Kazarin, L. S.
    [J]. DOKLADY MATHEMATICS, 2007, 76 (01) : 592 - 595
  • [37] A Survey of SIP Authentication and Key Agreement Schemes
    Kilinc, H. Hakan
    Yanik, Tugrul
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 1005 - 1023
  • [38] A new method for constructing key agreement schemes
    V. M. Sidel’nikov
    L. S. Kazarin
    [J]. Doklady Mathematics, 2007, 76 : 592 - 595
  • [39] Storage and Rekeying Cost for Cumulative Member Removal in Secure Group Communication
    Poornima, A. S.
    Aparna, R.
    Amberker, B. B.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 212 - 220
  • [40] Group-oriented encryption for dynamic groups with constant rekeying cost
    Nishat, Koti
    Purushothama, B. R.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4120 - 4137