Design of self-healing key distribution schemes

被引:70
|
作者
Blundo, C [1 ]
D'Arco, P [1 ]
De Santis, A [1 ]
Listo, M [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
group communication; key distribution; self-healing;
D O I
10.1023/B:DESI.0000029210.20690.3f
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to establish group keys for secure communication. In such a scheme, a group manager, at the beginning of each session, in order to provide a key to each member of the group, sends packets over a broadcast channel. Every user, belonging to the group, computes the group key by using the packets and some private information. The group manager can start multiple sessions during a certain time-interval, by adding/removing users to/from the initial group. The main property of the scheme is that, if during a certain session some broadcasted packet gets lost, then users are still capable of recovering the group key for that session simply by using the packets they have received during a previous session and the packets they will receive at the beginning of a subsequent one, without requesting additional transmission from the group manager. Indeed, the only requirement that must be satisfied, in order for the user to recover the lost keys, is membership in the group both before and after the sessions in which the broadcast messages containing the keys are sent. This novel and appealing approach to key distribution is quite suitable in certain military applications and in several Internet-related settings, where high security requirements need to be satisfied. In this paper we continue the study of self-healing key distribution schemes, introduced by Staddon et al. [37]. We analyze some existing constructions: we show an attack that can be applied to one of these constructions, in order to recover session keys, and two problems in another construction. Then, we present a new mechanism for implementing the self-healing approach, and we present an efficient construction which is optimal in terms of user memory storage. Finally, we extend the self-healing approach to key distribution, and we present a scheme which enables a user to recover from a single broadcast message all keys associated with sessions in which he is member of the communication group.
引用
收藏
页码:15 / 44
页数:30
相关论文
共 50 条
  • [1] Design of Self-Healing Key Distribution Schemes
    Carlo Blundo
    Paolo D’Arco
    Alfredo De Santis
    Massimiliano Listo
    Designs, Codes and Cryptography, 2004, 32 : 15 - 44
  • [2] On self-healing key distribution schemes
    Blundo, Carlo
    D'Arco, Paolo
    De Santis, Alfredo
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (12) : 5455 - 5467
  • [3] On threshold self-healing key distribution schemes
    Sáez, G
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 340 - 354
  • [4] Self-healing key distribution schemes with sponsorization
    Sáez, G
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 22 - 31
  • [5] Randomness in self-healing key distribution schemes
    Blundo, C
    2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 80 - 84
  • [6] Definitions and bounds for self-healing key distribution schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    AUTOMATA , LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2004, 3142 : 234 - 245
  • [7] A Survey of Group Key Distribution Schemes With Self-Healing Property
    Rams, Tomasz
    Pacyna, Piotr
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 820 - 842
  • [8] Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
    Tian, Biming
    Han, Song
    Parvin, Sazia
    Hu, Jiankun
    Das, Sajal
    COMPUTER JOURNAL, 2011, 54 (04): : 549 - 569
  • [9] Flaws in some self-healing key distribution schemes with revocation
    Daza, Vanesa
    Herranz, Javier
    Saez, German
    INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 523 - 526
  • [10] Designing scalable self-healing key distribution schemes with revocation capability
    Dutta, Ratna
    Mukhopadhyay, Sourav
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 419 - 430