Abstract
A fundamental concern of any secure group communication system is that of key management. Wireless environments create new key management problems and requirements to solve these problems. One such core requirement in these emerging networks is that of self-healing. In systems where users can be offline and miss updates self healing allows a user to recover lost keys and get back into the secure communication without putting extra burden on the group manager. Clearly self healing must be only available to authorized users and this creates more challenges in that we must ensure unauthorized or revoked users cannot, themselves or by means of collusion, avail of self healing. To this end we enhance the one-way key chain based self-healing key distribution of Dutta et al. by introducing a collusion resistance property between the revoked users and the newly joined users. Our scheme is based on the concept of access polynomials. These can be loosely thought of as white lists of authorized users as opposed to the more widely used revocation polynomials or black lists of revoked users. We also allow each user a pre-arranged life cycle distributed by the group manager. Our scheme provides better efficiency in terms of storage, and the communication and computation costs do not increase as the number of sessions grows as compared to most current schemes. We analyze our scheme in an appropriate security model and prove that the proposed scheme is computationally secure and not only achieving forward and backward secrecy, but also resisting collusion between the new joined users and the revoked users. Unlike most existing schemes the new scheme allows temporary revocation. Also unlike existing schemes, our construction does not collapse if the number of revoked users crosses a threshold value. This feature increases resilience against revocation based denial of service (DOS) attacks and thus improves availability of communication channel.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alexi, Chor, Goldreich, Schnorr: RSA Rabin Bits are 1/2 + 1/poly(log n) secure. In: Proceedings of the IEEE 25th Annual Symposium on Foundations of Computer Science, pp. 449–557 (1984)
Blundo, C., D’Arco, P., Santis, A., Listo, M.: Design of Self-healing Key Distribution Schemes. Design Codes and Cryptology 32, 15–44 (2004)
Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient Self-Healing Key Distributions with Revocation for Wireless Network using One Way Key Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)
Dutta, R., Mukhopadhyay, S., Das, A., Emmanuel, S.: Generalized Self-Healing Key Distribution using Vector Space Access Structure. In: Das, A., Pung, H.K., Lee, F.B.S., Wong, L.W.C. (eds.) NETWORKING 2008. LNCS, vol. 4982, pp. 612–623. Springer, Heidelberg (2008)
Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)
Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Self-healing Property. IEEE Communication Letters 2005, 9, 759–761 (2005)
Liu, D., Ning, P., Sun, K.: Efficient Self-healing Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM CCS 2003, pp. 27–31 (2003)
Saez, G.: On Threshold Self-healing Key Distribution Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 340–354. Springer, Heidelberg (2005)
Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy 2002, pp. 224–240 (2002)
Tian, B., Han, S., Dillon, T.-S., Das, S.: A Self-Healing Key Distribution Scheme Based on Vector Space Secret Sharing and One Way Hash Chains. In: Proceedings of IEEE WoWMoM 2008 (2008)
Tipton, H.: Official (ISC)2- Guide to The CISSP-CBK, 1st edn. Auerbach Publications (2006)
Zou, X.K., Dai, Y.S.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: ICCT 2006, vol. 28, pp. 455–459 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dutta, R., Mukhopadhyay, S., Dowling, T. (2010). Enhanced Access Polynomial Based Self-healing Key Distribution. In: Gu, Q., Zang, W., Yu, M. (eds) Security in Emerging Wireless Communication and Networking Systems. SEWCN 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 42. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11526-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-11526-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11525-7
Online ISBN: 978-3-642-11526-4
eBook Packages: Computer ScienceComputer Science (R0)