Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:3
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 40 条
[1]   On the Insider Security of MLS [J].
Alwen, Joel ;
Jost, Daniel ;
Mularczyk, Marta .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 :34-68
[2]  
[Anonymous], 2013, GUARDIAN
[3]   ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :1799-1817
[4]   Looking up data in P2P systems [J].
Balakrishnan, I ;
Kaashoek, MF ;
Karger, D ;
Morris, R ;
Stoica, I .
COMMUNICATIONS OF THE ACM, 2003, 46 (02) :43-48
[5]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[6]   On the Worst-Case Inefficiency of CGKA [J].
Bienstock, Alexander ;
Dodis, Yevgeniy ;
Garg, Sanjam ;
Grogan, Garrison ;
Hajiabadi, Mohammad ;
Rosler, Paul .
THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 :213-243
[7]   Social Network Sites: Definition, History, and Scholarship [J].
Boyd, Danah M. ;
Ellison, Nicole B. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01) :210-230
[8]   Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing [J].
Chen, Jiayi ;
He, Jianping ;
Cai, Lin ;
Pan, Jianping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1173-1187
[9]   Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems [J].
Chen, Tong ;
Zhang, Lei ;
Choo, Kim-Kwang Raymond ;
Zhang, Rui ;
Meng, Xinyu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10766-10778
[10]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101