Abstract
People need to communicate each other in many emerging networks, i.e., in ad hoc networks. To ensure the security for group communication, group key management as a fundamental cryptographic primitive has been proposed. Although many proposals with regard to group key managemet have been introduced, they cannot be efficiently applied to realize secure subgroup and intergroup communications. In this paper, we propose two group key distribution schemes providing efficient solutions to these two problems. Our protocols do not require interaction between users. Storage and computation analyses show that our proposals are secure and efficient, compared with existing schemes. Based on those basic schemes, we further present extensions for multipartite groups, by which the efficiency is greatly improved in this scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdalla, M., Shavitt, Y., Wool, A.: Key management for restricted multicast using broadcast encryption. IEEE/ACM Transactions on Networking 8(4), 443–454 (2000)
Blundo, C., Mattos, L.A.F., Stinson, D.R.: Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theoretical Computer Science 200(1-2), 313–334 (1998)
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Cheon, J.H., Jho, N.S., Kim, M.H., Yoo, E.S.: Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. IEEE Transactions on Information Theory 54(11), 5155–5171 (2008)
Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171–188. Springer, Heidelberg (2009)
Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)
Ingemarsson, I., Tang, D., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)
Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)
Kogan, N., Shavitt, Y., Wool, A.: A Practical Revocation Scheme for Broadcast Encryption Using Smartcards. ACM Transactions on Information and System Security (TISSEC) 9(3), 325–351 (2006)
Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: Dynamic Join-exit-tree Amortization and Scheduling for Contributory Key Management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1–20. Springer, Heidelberg (2001)
Park, J.H., Kim, H.J., Sung, M.H., Lee, D.H.: Public Key Broadcast Encryption Schemes With Shorter Transmissions. IEEE Transactions on Broadcasting 54(3), 401–411 (2008)
Sherman, A.T., McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-way Function Trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)
Snoeyink, J., Suri, S., Varghese, G.: A lower bound for multicast key distribution. In: INFOCOM 2001, vol. 1, pp. 422–431. IEEE (2001)
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Wool, A.: Key Management for Encrypted Broadcast. ACM Transactions on Information and System Security (TISSEC) 3(2), 107–134 (2000)
Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)
Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: A new key management paradigm. IEEE/ACM Transactions on Networking 21(2), 621–633 (2013)
Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farrà s, O.: Bridging Broadcast Encryption and Group Key Agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)
Yu, W., Sun, Y., Liu, K.: Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Transactions on Dependable and Secure Computing 4(3), 228–242 (2007)
Zhang, L., Wu, Q., Qin, B.: Authenticated Asymmetric Group Key Agreement Protocol and Its Application. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–5 (2010)
Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 496–510. Springer, Heidelberg (2014)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Information Sciences 181(19), 4318–4329 (2011)
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J., González-Nicolás, Ú.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Computer Networks 55(15), 3246–3255 (2011)
Zou, X., Dai, Y.S., Bertino, E.: A Practical and Flexible Key Management Mechanism for Trusted Collaborative Computing. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 1211–1219. IEEE (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Qin, B., Wang, L., Wang, Y., Wu, Q., Shi, W., Liang, B. (2014). Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_34
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)