A quick group key distribution scheme with "entity revocation"

被引:0
|
作者
Anzai, J
Matsuzaki, N
Matsumoto, T
机构
[1] Adv Mobile Telecommun Secur Technol Res Labs, Kohoku Ku, Yokohama, Kanagawa 2220033, Japan
[2] Yokohama Natl Univ, Div Artificial Environm & Syst, Yokohama, Kanagawa 2408501, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a group key distribution scheme with an "entity revocation", which renews a group key of all the entities except one (or more) specific entity (ies). In broadcast systems such as Pay-TV, Internet multicast and mobile telecommunication for a group, a manager should revoke a dishonest entity or an unauthorized terminal as soon as possible to protect the secrecy of the group communication. However, it takes a long time for the "entity revocation" on a large group, if the manager distributes a group key to each entity except the revoked one. A recently published paper proposed a group key distribution scheme in which the amount of transmission and the delay do not rely on the number of entities of the group, using a type of secret sharing technique. This paper devises a novel key distribution scheme with "entity revocation" that makes frequent key distribution a practical reality. This scheme uses a technique similar to "threshold cryptosystems" and the one-pass Diffie-Hellman key exchange scheme.
引用
收藏
页码:333 / 347
页数:15
相关论文
共 50 条
  • [21] A group key distribution scheme with decentralised user join
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 146 - 163
  • [22] A Secure Session Key Distribution Scheme for Group Communications
    林仁宏
    詹进科
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 192 - 196
  • [23] Geographic server distribution model for key revocation
    Sudip Misra
    Sumit Goswami
    Gyan Prakash Pathak
    Nirav Shah
    Isaac Woungang
    Telecommunication Systems, 2010, 44 : 281 - 295
  • [24] Efficient broadcast key distribution with dynamic revocation
    Batten, Lynn
    Yi, Xun
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 351 - 362
  • [25] Geographic server distribution model for key revocation
    Misra, Sudip
    Goswami, Sumit
    Pathak, Gyan Prakash
    Shah, Nirav
    Woungang, Isaac
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 281 - 295
  • [26] Self-healing key distribution with revocation
    Staddon, J
    Miner, S
    Franklin, M
    Balfanz, D
    Malkin, M
    Dean, D
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 241 - 257
  • [27] New solution scheme for the member revocation in group signature
    Zhang, D.-D., 1600, Editorial Board of Journal on Communications (35):
  • [28] Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
    Zhou, Jie
    Ou, Yong-hao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 254 - 265
  • [29] AN EFFICIENT FORWARD SECURE GROUP SIGNATURE SCHEME WITH REVOCATION
    Sun Huihui Chen Shaozhen (Department of Applied Mathematics
    Journal of Electronics(China), 2008, (06) : 797 - 802
  • [30] Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation
    Begum, Nasima
    Nakanishi, Toru
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 80 - 84