Skip to main content

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks

  • Conference paper
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8792))

Included in the following conference series:

  • 2208 Accesses

Abstract

People need to communicate each other in many emerging networks, i.e., in ad hoc networks. To ensure the security for group communication, group key management as a fundamental cryptographic primitive has been proposed. Although many proposals with regard to group key managemet have been introduced, they cannot be efficiently applied to realize secure subgroup and intergroup communications. In this paper, we propose two group key distribution schemes providing efficient solutions to these two problems. Our protocols do not require interaction between users. Storage and computation analyses show that our proposals are secure and efficient, compared with existing schemes. Based on those basic schemes, we further present extensions for multipartite groups, by which the efficiency is greatly improved in this scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Abdalla, M., Shavitt, Y., Wool, A.: Key management for restricted multicast using broadcast encryption. IEEE/ACM Transactions on Networking 8(4), 443–454 (2000)

    Article  Google Scholar 

  2. Blundo, C., Mattos, L.A.F., Stinson, D.R.: Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theoretical Computer Science 200(1-2), 313–334 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  3. Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  5. Cheon, J.H., Jho, N.S., Kim, M.H., Yoo, E.S.: Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. IEEE Transactions on Information Theory 54(11), 5155–5171 (2008)

    Article  MathSciNet  Google Scholar 

  6. Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)

    Article  MathSciNet  Google Scholar 

  7. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  8. Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171–188. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Halevy, D., Shamir, A.: The LSD Broadcast Encryption Scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Ingemarsson, I., Tang, D., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  11. Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004)

    Article  Google Scholar 

  12. Kogan, N., Shavitt, Y., Wool, A.: A Practical Revocation Scheme for Broadcast Encryption Using Smartcards. ACM Transactions on Information and System Security (TISSEC) 9(3), 325–351 (2006)

    Article  Google Scholar 

  13. Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: Dynamic Join-exit-tree Amortization and Scheduling for Contributory Key Management. IEEE/ACM Trans. Netw. 14(5), 1128–1140 (2006)

    Article  Google Scholar 

  14. Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1–20. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Park, J.H., Kim, H.J., Sung, M.H., Lee, D.H.: Public Key Broadcast Encryption Schemes With Shorter Transmissions. IEEE Transactions on Broadcasting 54(3), 401–411 (2008)

    Article  Google Scholar 

  16. Sherman, A.T., McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-way Function Trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)

    Article  Google Scholar 

  17. Snoeyink, J., Suri, S., Varghese, G.: A lower bound for multicast key distribution. In: INFOCOM 2001, vol. 1, pp. 422–431. IEEE (2001)

    Google Scholar 

  18. Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)

    Article  Google Scholar 

  19. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  20. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  21. Wool, A.: Key Management for Encrypted Broadcast. ACM Transactions on Information and System Security (TISSEC) 3(2), 107–134 (2000)

    Article  MathSciNet  Google Scholar 

  22. Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  23. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Manjón, J.A.: Fast transmission to remote cooperative groups: A new key management paradigm. IEEE/ACM Transactions on Networking 21(2), 621–633 (2013)

    Article  Google Scholar 

  24. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O.: Bridging Broadcast Encryption and Group Key Agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  25. Yu, W., Sun, Y., Liu, K.: Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Transactions on Dependable and Secure Computing 4(3), 228–242 (2007)

    Article  Google Scholar 

  26. Zhang, L., Wu, Q., Qin, B.: Authenticated Asymmetric Group Key Agreement Protocol and Its Application. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–5 (2010)

    Google Scholar 

  27. Zhang, L., Wu, Q., Qin, B., Deng, H., Liu, J., Shi, W.: Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 496–510. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  28. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  29. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Information Sciences 181(19), 4318–4329 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  30. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J., González-Nicolás, Ú.: Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Computer Networks 55(15), 3246–3255 (2011)

    Article  Google Scholar 

  31. Zou, X., Dai, Y.S., Bertino, E.: A Practical and Flexible Key Management Mechanism for Trusted Collaborative Computing. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 1211–1219. IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Qin, B., Wang, L., Wang, Y., Wu, Q., Shi, W., Liang, B. (2014). Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11698-3_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11697-6

  • Online ISBN: 978-3-319-11698-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics