An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries

被引:0
|
作者
Huafei ZHU [1 ]
机构
[1] School of Computer and Computing Science, Zhejiang University City College
关键词
adaptive adversary; multicast key distribution; pseudo-random number generator; semantic secu rity; symmetric-key encryption;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, an efficient construction of multicast key distribution schemes based on semantically secure symmetric-key encryption schemes and cryptographically strong pseudo-random number generators is presented and analyzed. The proposed scheme is provably secure against adaptive adversaries leveraging the security amplification technique defined over the logical key hierarchy structures. Our protocol tolerates any coalition of revoked users; in particular, we do not assume any limit on the size or structure of the coalition. The proposed scheme is efficient as a performance of Join or Leave procedure requires 2 log(N) multicast activities defined over a sibling ancestor node set, 2 log(N) internal state updates of the underlying pseudo-random number generator and 2 log(N) symmetric-key encryption activities for N users in a session.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 50 条
  • [31] A scalable and Secure Key Distribution Mechanism for Multicast Networks
    Singh, Ajeet P.
    Potey, Swapnil M.
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 211 - 214
  • [32] Minimum redundancy tree for key distribution in secure multicast
    Chan, SP
    Kok, CW
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 171 - 171
  • [33] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [34] SECURE MULTICAST COMMUNICATIONS USING A KEY DISTRIBUTION CENTER
    JORDAN, F
    MEDINA, M
    INFORMATION NETWORKS AND DATA COMMUNICATION, 1994, 23 : 367 - 380
  • [35] Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
    Mohassel, Payman
    Weinreb, Enav
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 481 - +
  • [36] Efficient key management scheme for secure application level multicast
    Bettahar, Hatem
    Alkubeily, Mothanna
    Bouabdallah, Abdelmadjid
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 430 - 435
  • [37] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (01) : 21 - 30
  • [38] Efficient clustering for multicast key distribution in MANETs
    Bouassida, MS
    Chrisment, I
    Festor, O
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 138 - 153
  • [39] Computation-efficient multicast key distribution
    Xu, Lihao
    Huang, Cheng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (05) : 577 - 586
  • [40] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 17 - 23