Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs

被引:2
|
作者
Zhang, Lei [1 ,2 ,3 ]
Han, Wendie [1 ,2 ,3 ]
Zhang, Rui [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Meng, Xinyu [4 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Minist Educ, Engn Res Ctr Software Hardware Codesign Technol &, Shanghai 200062, Peoples R China
[4] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
关键词
Distributed online social networks; key management; secure group communication; AGREEMENT; PRIVACY; EFFICIENT; PROTOCOL;
D O I
10.1109/TIFS.2023.3286712
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed online social network (DOSN) solves the challenges of single-point failure and user data privacy faced by traditional online social network (OSN). Online discussion group, allowing a user to facilitate the communications with other users, is one of the most important components of (D)OSN. Key management is the key technology to ensure the secure establishment of discussion groups in DOSNs. However, the existing key management schemes for secure discussion group establishment in DOSNs cannot meet the requirements of sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. In this paper, we propose a novel key management scheme for secure discussion group establishment in DOSNs. In our scheme, any user could use our key management scheme to initialize a discussion group with a piece of discussion group information. Users who are interested in the group topic contained in the discussion group information can join and leave the discussion group at any time once the discussion group is initialized with one-round communication. Any user/sender can find the users that he/she wants to communicate with by looking up the discussion group information of a discussion group and then send encrypted messages to some or all of the users in the discussion group. Therefore, our scheme achieves sender non-restriction, receiver controllability, round optimal, certificate freeness simultaneously. Security analysis also shows that our scheme achieves confidentiality, authentication, full collusion resistance, known-key security and perfect forward security.
引用
收藏
页码:3706 / 3719
页数:14
相关论文
共 50 条
  • [21] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [22] A Self-Organized Key Management Scheme for Ad Hoc Networks Based on Identity-Based Cryptography
    Pura, Mihai Lica
    Buchs, Didier
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [23] Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks
    Huo Shiwei
    Tang Yubo
    Liu Shaojun
    Tian Balin
    2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 209 - 213
  • [24] Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme
    Purushothama, Byrapura Rangappa
    Amberker, B. B.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 122 - 133
  • [25] An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
    Qin, Zhongyuan
    Zhang, Xinshuai
    Feng, Kerong
    Zhang, Qunfang
    Huang, Jie
    SENSORS, 2014, 14 (10) : 17937 - 17951
  • [26] Identity and Pairing-based Secure Key Management Scheme for Heterogeneous Sensor Networks
    Rahman, Sk. Md. Mizanur
    Nasser, Nidal
    Saleh, Kassem
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 423 - 428
  • [27] Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update
    Zhang, Xiangsong
    Liu, Zhenhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2792 - 2810
  • [28] Group Based Dual Mode Key Management Scheme for Secure Communication in Vehicular Ad Hoc Networks
    Ramamoorthy, Raghu
    Thangavelu, Menakadevi
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (02) : 949 - 973
  • [29] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
  • [30] An improved semantically-secure identity-based signcryption scheme in the standard model
    Jin, Zhengping
    Wen, Qiaoyan
    Du, Hongzhen
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 545 - 552