An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries

被引:0
|
作者
Huafei ZHU [1 ]
机构
[1] School of Computer and Computing Science, Zhejiang University City College
关键词
adaptive adversary; multicast key distribution; pseudo-random number generator; semantic secu rity; symmetric-key encryption;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, an efficient construction of multicast key distribution schemes based on semantically secure symmetric-key encryption schemes and cryptographically strong pseudo-random number generators is presented and analyzed. The proposed scheme is provably secure against adaptive adversaries leveraging the security amplification technique defined over the logical key hierarchy structures. Our protocol tolerates any coalition of revoked users; in particular, we do not assume any limit on the size or structure of the coalition. The proposed scheme is efficient as a performance of Join or Leave procedure requires 2 log(N) multicast activities defined over a sibling ancestor node set, 2 log(N) internal state updates of the underlying pseudo-random number generator and 2 log(N) symmetric-key encryption activities for N users in a session.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 50 条
  • [21] Performance Efficient EOMCT Algorithm for Secure Multicast Key Distribution for Mobile Adhoc Networks
    Devi, D. Suganya
    Padmavathi, G.
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 934 - +
  • [22] Computation efficient multicast key distribution
    Xu, LH
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 425 - 425
  • [23] Energy Efficient CBMT for Secure Multicast Key Distribution in Mobile Ad Hoc Networks
    Suganyadevi, D.
    Padmavathi, G.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 248 - 255
  • [24] An Efficient Key Agreement Scheme for Dynamic Secure Multicast
    Chen Li-qing
    Yang Song
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 492 - 496
  • [25] An efficient approach to group key management in secure multicast
    Pour, AN
    Kumekawa, K
    Kato, T
    Itoh, S
    Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 218 - 223
  • [26] The efficient secure key management structure for a scalable multicast
    Park, HU
    Lee, IY
    ISE'2001: PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INFORMATION SYSTEMS AND ENGINEERING, 2001, : 297 - 303
  • [27] Efficient Key Management Scheme for Secure Multicast in MANET
    Lakshmanaperumal, J.
    Thanushkodi, K.
    Kumar, N. M. Saravana
    Saravanan, K.
    Vigneshwaran, D.
    Purusothaman, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 157 - 164
  • [28] An efficient key management scheme for secure wireless multicast
    Sun, Y
    Trappe, W
    Liu, KJR
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1236 - 1240
  • [29] A New Groups Key Distribution for Secure Wireless Multicast
    Han, Yiliang
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 388 - 391
  • [30] Resilient LKH: Secure multicast key distribution schemes
    Safavi-Naini, Reihaneh
    Wang, Huaxiong
    Wong, Duncan S.
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2006, 17 (05) : 1205 - 1221