Reducing Rekeying Time Using an Integrated Group Key Agreement Scheme

被引:15
作者
Gu, Xiaozhuo [1 ]
Zhao, Youjian [1 ]
Yang, Jianzu
机构
[1] Tsingjua Univ, Dept Comp Sci, Tsinghua, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Access control; computation and communication efficiency; contributory group key agreement; group communications; security; SECURE GROUP COMMUNICATIONS; ROLE-BASED ACCESS; MANAGEMENT; HIERARCHY;
D O I
10.1109/JCN.2012.6292248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the requirement for providing multiple levels of access control for group members, many group key management schemes designed for hierarchical access control have been put forward. However, most of these schemes focus on the efficiency of group key establishment and rekeying in centralized environments. This paper proposes an integrated group key agreement (IGK) scheme for contributory environments. The IGK scheme employs the integrated key graph to remove key redundancies existing in single key trees, and reduces key establishment and rekeying time while providing hierarchical access control. Performance analyses and simulations conducted with respect to computation and communication overheads indicate that our proposed IGK scheme is more efficient than the independent group key agreement scheme.
引用
收藏
页码:418 / 428
页数:11
相关论文
共 25 条
[1]   An integrated solution for secure group communication in wide-area networks [J].
Agarwal, DA ;
Chevassutt, O ;
Thompson, MR ;
Tsudik, G .
PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, :22-28
[2]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[3]  
Alves-Foss J., 2000, P 23 NAT INF SYST SE, P254
[4]  
[Anonymous], 1996, P 3 ACM C COMP COMM
[5]   Dynamic and Efficient Key Management for Access Hierarchies [J].
Atallah, Mikhail J. ;
Blanton, Marina ;
Fazio, Nelly ;
Frikken, Keith B. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
[6]  
Banerjee S., 2002, IEEE J SEL AREAS COM, V20
[7]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[8]   DISEC: A distributed framework for scalable secure many-to-many communication [J].
Dondeti, LR ;
Mukherjee, S ;
Samal, A .
ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, :693-698
[9]  
Gu X., 2008, COMPUT SECUR, V28, P1820
[10]   Key management for content access control in a hierarchy [J].
Hassen, H. Ragab ;
Bouabdallah, A. ;
Bettahar, H. ;
Challal, Y. .
COMPUTER NETWORKS, 2007, 51 (11) :3197-3219