Skip to main content
Log in

Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A modification is presented of the scheme of preliminary Blom’s key distribution taking into account the direction of information flows. The modification makes it necessary to use a function of three variables. The function of forming key materials ceases to be symmetrical. An exponential form of this function was proposed, which does not increase the amount of key materials.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Shamir, A., Identity-based cryptosystems and signature schemes, Advances in Cryptology: Proceedings of CRYPTO 84; Lect. Notes Comput. Sci., 1984, vol. 7, pp. 47–53.

  2. Boneh, D. and Franklin, M., Identity-based encryption from the Weil pairing, CRYPTO’01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, 2001, pp. 213–229.

  3. E. B. Aleksandrova, Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958.

    Article  Google Scholar 

  4. E. B. Aleksandrova and E. N. Shkorkina, Tripartite outsourcing key-agreement on the bilinear pairings, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 796–801.

    Article  Google Scholar 

  5. Lee, C.-C., Chung, P.-S., and Hwang, M.-S., A survey on attribute-based encryption schemes of access control in cloud environments, Int. J. Network Secur., 2013, vol. 15, no. 4, pp. 231–240.

    Google Scholar 

  6. Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.

    Article  Google Scholar 

  7. Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76.

  8. Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.

    Article  Google Scholar 

  9. Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://ceur-ws.org/Vol-1732/paper3.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. Belim.

Additional information

Translated by M. Kromin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Belim, S.V., Belim, S.Y. Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels. Aut. Control Comp. Sci. 52, 1134–1137 (2018). https://doi.org/10.3103/S0146411618080370

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080370

Keywords:

Navigation