Skip to main content

Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7011))

Abstract

In this paper, we develop and analyze a computationally secure self-healing key distribution scheme with revocation capability, adopting the idea of access polynomial and a one-way hash chain. The main emphasis of our proposed scheme is that it achieves a stronger security goal, namely it can resist collusion against any number of users, while having a significant improvement in the communication overhead as compared to the existing schemes. Our design uses constant storage and hence is especially suitable for unreliable environments in which devices have limited resources. The security analysis is in an existing security model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blundo, C., et al.: Design of Self-healing Key Distribution Schemes. Design Codes and Cryptology 32, 15–44 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  2. Blundo, C., D’Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Self-Healing Key Distribution Schemes. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 234–245. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Dutta, R., Mukhopadhyay, S., Das, A., Emmanuel, S.: Generalized Self-healing Key Distribution Using Vector Space Access Structure. In: Das, A., Pung, H.K., Lee, F.B.S., Wong, L.W.C. (eds.) NETWORKING 2008. LNCS, vol. 4982, pp. 612–623. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Dutta, R., Mukhopadhyay, S., Dowling, T.: Enhanced Access Polynomial Based Self-healing Key Distribution. In: Gu, Q., Zang, W., Yu, M. (eds.) SEWCN 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 42, pp. 13–24. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Sáez, G.: Self-healing Key Distribution Schemes with Sponsorization. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 22–31. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  MATH  Google Scholar 

  8. Simmons, G.J., Jackson, W., Martin, K.: The Geometry of Secret Sharing Schemes. Bulletin of the ICA 1, 71–88 (1991)

    MATH  Google Scholar 

  9. Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Self-healing Property. IEEE Communication Letters 9, 759–761 (2005)

    Article  Google Scholar 

  10. Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-healing Group Key Distribution with Time-limited Node Revocation for Wireless Sensor Networks. Ad Hoc Networks 5(1), 14–23 (2007)

    Article  Google Scholar 

  11. Kausar, F., Hassian, S., Park, J.H., Masood, A.: Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737–748. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Liu, D., Ning, P., Sun, K.: Efficient Self-healing Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM CCS 2003, pp. 27–31 (2003)

    Google Scholar 

  13. More, S., Malkin, M., Staddon, J.: Sliding-window Self-healing Key Distribution with Revocation. In: ACM Workshop on Survivable and Self-regenerative Systems 2003, pp. 82–90 (2003)

    Google Scholar 

  14. Xu, Q.Y., He, M.X.: Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 41–55. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Saez, G.: On Threshold Self-healing Key Distribution Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 340–354. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Saez, G.: Self-healing Key Distribution Schemes with Sponsorization. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 22–31. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  18. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy 2002, pp. 224–240 (2002)

    Google Scholar 

  19. Tian, B., Han, S., Dillon, T.-S.: An Efficient Self-Healing Key Distribution Scheme. In: Proceedings of the 2nd IFIP Internal Conference on New Technologies, Mobility and Security (2008)

    Google Scholar 

  20. Tian, B., Han, S., Dillon, T.-S., Das, S.: A Self-Healing Key Distribution Scheme Based on Vector Space Secret Sharing and One Way Hash Chains. In: Proceedings of IEEE WoWMoM (2008)

    Google Scholar 

  21. Zou, X.K., Dai, Y.S.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: ICCT 2006, vol. 28, pp. 455–459 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dutta, R. (2011). Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds) Security Aspects in Information Technology. InfoSecHiComNet 2011. Lecture Notes in Computer Science, vol 7011. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24586-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24586-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24585-5

  • Online ISBN: 978-3-642-24586-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics