DGKD: Distributed group key distribution with authentication capability

被引:11
|
作者
Adusumilli, P [1 ]
Zou, XK [1 ]
Ramamurthy, B [1 ]
机构
[1] Purdue Univ, Sch Sci, Indianapolis, IN USA
关键词
secure group communication; group key management; centralized key distribution; (distributed) contributory key agreement; distributed key distribution;
D O I
10.1109/IAW.2005.1495965
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Group key management (GKM) is the most important issue in secure group communication (SGC). The existing GKM protocols fall into three typical classes: centralized group key distribution (CGKD), decentralized group key management (DGKM), and distributed/contributory group key agreement (CGKA). Serious problems remains in these protocols, as they require existence of central trusted entities (such as group controller or subgroup controllers), relaying of messages (by subgroup controllers), or strict member synchronization (for multiple round stepwise key agreement), thus suffering from the single point of failure and attack, performance bottleneck, or misoperations in the situation of transmission delay or network failure. In this paper, we propose a new class of GKM protocols: distributed group key distribution (DGKD). The new DGKD protocol solves the above problems and surpasses the existing GKM protocols in terms of simplicity, efficiency, scalability, and robustness.
引用
收藏
页码:286 / 293
页数:8
相关论文
共 50 条
  • [31] Authentication and key distribution protocol in UPT system
    Zhu, Yujun
    Lin, Xiaodong
    Liao, Jianxin
    Chen, Junliang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1999, 27 (07): : 51 - 54
  • [32] Error detection and authentication in quantum key distribution
    Yamamura, A
    Ishizuka, H
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 260 - 273
  • [33] Integrating authentication in public key distribution system
    Lee, WB
    Chang, CC
    INFORMATION PROCESSING LETTERS, 1996, 57 (01) : 49 - 52
  • [34] KRYPTOKNIGHT AUTHENTICATION AND KEY DISTRIBUTION-SYSTEM
    MOLVA, R
    TSUDIK, G
    VANHERREWEGHEN, E
    ZATTI, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 155 - 174
  • [35] Weaknesses in EHA authentication and key distribution protocol
    Stanek, M
    Olejár, D
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95
  • [36] Independent Key Distribution Protocols for Broadcast Authentication
    Bezawada, Bruhadeshwar
    Kulkarni, Sandeep
    Ray, Indrajit
    Ray, Indrakshi
    Li, Rui
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 27 - 38
  • [37] Key generation schemes for channel authentication in quantum key distribution protocol
    Borodin, Mikhail
    Zhilyaev, Andrey
    Urivskiy, Alexey
    IET QUANTUM COMMUNICATION, 2021, 2 (03): : 90 - 97
  • [38] GROUP-ORIENTED KEY MANAGEMENT AND AUTHENTICATION METHOD
    MUTOH, Y
    TAKAGI, K
    OKADA, K
    MATSUSHITA, Y
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 540 - 546
  • [39] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
  • [40] Group-oriented authentication mechanism with key exchange
    Chang, YS
    Wu, TC
    COMPUTER COMMUNICATIONS, 1998, 21 (05) : 485 - 497