Key management for secure multicast communication using secret sharing-based revocation scheme

被引:0
|
作者
Liu, XX [1 ]
Yang, M [1 ]
Wang, XK [1 ]
机构
[1] PLA Univ Sci & Technol, Inst Command Automat, Nanjing 210007, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS | 2005年
关键词
secret sharing; revocation; key management; group controller; broadcast;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new secret sharing-based revocation scheme, and apply it into key management for secure multicast communication. The group key is distributed via a broadcast/multicast channel. In our protocol, the member's storage cost is a little constant which is independent of the number of broadcast members. The broadcast size is only relative to the number of evicted members. And most important, the hatched re-keying operation in our scheme is as same as the single re-keying operation. Our protocol provides complete forward and backwards security, and can be easily proved an unconditionally secure session key distribution scheme with t-revocation capability.
引用
收藏
页码:1262 / 1266
页数:5
相关论文
共 50 条
  • [1] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [2] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, M
    PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 31 - 37
  • [3] A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network
    Zhang, Yiying
    Wu, Chunying
    Cao, Jinping
    Li, Xiangzhen
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, Ming
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 630 - 635
  • [5] Research on multicast key management technology based on secret sharing
    Yang, Ming
    Wang, Xiao-Kang
    Liu, Xin-Xing
    Liu, Yang-Zhi
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (02): : 1 - 4
  • [6] Secret Sharing-based Authenticated Key Agreement Protocol
    Dzurenda, Petr
    Ricci, Sara
    Marques, Raul Casanova
    Hajny, Jan
    Cika, Petr
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [7] Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2025, 13 : 9015 - 9031
  • [8] A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
    Anubhav Shivhare
    Manish Kumar Maurya
    Jafar Sarif
    Manish Kumar
    The Journal of Supercomputing, 2022, 78 : 17132 - 17149
  • [9] A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
    Shivhare, Anubhav
    Maurya, Manish Kumar
    Sarif, Jafar
    Kumar, Manish
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (15): : 17132 - 17149
  • [10] Secure decentralized multicast key management scheme
    Yang, Ming
    Xiao, Yang
    Lu, Shan-Shan
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (01): : 20 - 24