Practical and provably-secure multicasting over high-delay networks

被引:0
|
作者
Nam, JY [1 ]
Kim, H
Kim, S
Won, D
Yang, HK
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
[2] Kangnam Univ, Dept Comp Engn, Yongin 449702, Gyeonggi, South Korea
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers the problem of authenticated key exchange in a dynamic group in which members join and leave the group in an arbitrary fashion. A group key exchange scheme for such a dynamic group is designed to minimize the cost of the rekeying operations associated with group updates. Although a number of schemes have attempted for many years to address this problem, all provably-secure schemes are inadequate in dealing with a dynamic group where group members are spread across a wide area network; their communication overhead for group rekeying is significant in terms of the number of communication rounds or the number of messages, both of which are recognized as the dominant factors that severely slow down group key exchange over a wide area network. In this paper, we propose an efficient key exchange scheme for this scenario and prove its security against an active adversary under the factoring assumption. The proposed scheme requires only a constant number of rounds while achieving low message complexity.
引用
收藏
页码:493 / 501
页数:9
相关论文
共 49 条
  • [1] A Provably-Secure Transmission Scheme for Wireless Body Area Networks
    Anyembe Andrew Omala
    Niyifasha Robert
    Fagen Li
    Journal of Medical Systems, 2016, 40
  • [2] A Provably-Secure Transmission Scheme for Wireless Body Area Networks
    Omala, Anyembe Andrew
    Robert, Niyifasha
    Li, Fagen
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [3] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [5] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2014, 14 (11): : 21023 - 21044
  • [6] Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING
    Boorghany, A.
    Bayat-Sarmadi, S.
    Jalili, R.
    SCIENTIA IRANICA, 2018, 25 (06) : 3442 - 3460
  • [7] Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction
    Lu, Xingye
    Zhang, Zhenfei
    Au, Man Ho
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 813 - 820
  • [8] PERFORMANCE OF STOP-AND-WAIT PROTOCOLS OVER HIGH-DELAY LINKS
    GOPAL, I
    KERMANI, P
    COMPUTER COMMUNICATIONS, 1983, 6 (03) : 115 - 119
  • [9] A Provably Secure User Authentication Scheme Over Unreliable Networks
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    Anh-Duy Tran
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 602 - 613
  • [10] Provably secure biometric-based client–server secure communication over unreliable networks
    Saleem, Muhammad Asad
    Islam, SK Hafizul
    Ahmed, Shafiq
    Mahmood, Khalid
    Hussain, Majid
    Journal of Information Security and Applications, 2021, 58