Abstract
Assuming a set of v entities and a set B of b key-sharing systems, this paper proposes a way of assigning each entity a subset of B so that any two entities have at least one common key-sharing system with which they can share an h-bit common key. Such an assignment is nothing but a cohesive incidence structure. If an entity is assigned a subset {S 0,..., Sr−1} ⊂ B then by the system centers for S 0 ..., S r−1, respectively, the entity is supplied r tamper-resistant modules (TRMs) containing data depending on the entity's identifier and the secret information for the corresponding system. The use of plural TRMs per entity can be sound with respect to the status of micro-electronics. Assume that every key-sharing system in B cannot be completely broken unless at least m TRMs are successfully attacked to infer m pieces of h × m-bit data inside them. Then each entity has r TRMs which contain r×h×m-bit data in total while the minimum number of TRMs to attack for complete breaking is b×m. The gain defined by (minimum number of TRMs to attack)/(total memory per key-bit per entity), is thus b/r. Gain 1 is attained by the (trivial) method using r=b TRMs per entity with b(≥1) key-sharing systems. A larger gain will save memory per entity to yield the same security level measured by the tamper-resistance required for complete breaking. This paper also provides a method to generate desirable assignments yielding gain b/r > 2 with large v exponential in r, by introducing a novel binary operation on incidence structures which preserves cohesiveness and constant-weight properties.
This work was done while the author was a Visiting Professor at Institute for Algorithms and Cognitive Systems, University of Karlsruhe, Am Fasanengarten 5, D-76128 Karlsruhe, Germany.
Preview
Unable to display preview. Download preview PDF.
References
T. Matsumoto and H. Imai, “On the Key Predistribution System: A practical solution to the key distribution problem” Advances in Cryptology: Proceedings of CRYPTO'87, Lecture Notes in Computer Science No. 293, pp. 185–193, Springer-Verlag, 1987.
R. Blom, “An optimal class of symmetric key generation systems,“ Advances in Cryptology: Proceedings of EUROCRYPT'84, Lecture Notes in Computer Science No. 209, pp. 335–338, Springer-Verlag, 1985.
L. Gong and D. J. Wheeler, “A matrix key-distribution scheme,” Journal of Cryptology, Vol. 2, pp. 51–59, Springer-Verlag, 1990.
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” Advances in Cryptology: Proceedings of CRYPTO'92, Lecture Notes in Computer Science No. 740, pp. 471–486, Springer-Verlag, 1993.
W.-A. Jackson, K. M. Martin, and C. M. O'Keefe, “Multisecret threshold schemes,” Advances in Cryptology: Proceedings of CRYPTO'93, Lecture Notes in Computer Science No. 773, pp. 126–135, Springer-Verlag, 1994.
T. Matsumoto, “A novel IC card for KPS-based cryptography,” IFIP WG10.5 Workshop on Secure Design and Test of Crypto-Chips, Abstract, Gmunden, Austria, 1991.
T. Beth, D. Jungnickel, and H. Lenz, Design Theory, B.I.-Wissenschaftsverlag, 1985.
T. Matsumoto, “Efficient algorithms for recursively defined incidence structures,” in preparation.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsumoto, T. (1995). Incidence structures for key sharing. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000446
Download citation
DOI: https://doi.org/10.1007/BFb0000446
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59339-3
Online ISBN: 978-3-540-49236-8
eBook Packages: Springer Book Archive