A new self-healing key distribution scheme

被引:3
作者
Blundo, C [1 ]
D'Arco, P [1 ]
Listo, M [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
来源
EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS | 2003年
关键词
D O I
10.1109/ISCC.2003.1214216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A self-healing key distribution scheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager to distribute a session key to each member of the group, broadcasts packets along the channel. If some packet gets lost, then users are still capable of recovering the group key using the received packets, without requesting additional transmission from the group manager. A user must be member both before and after the session in which a particular key is sent and lost, in order to be recovered through "self-healing". In this paper we propose a new technique to do self-healing, and we provide a secure and efficient scheme.
引用
收藏
页码:803 / 808
页数:6
相关论文
共 24 条
[1]  
ANZAI J, LECT NOTES COMP SCI, V1716, P333
[2]  
BERKOVITS S, 1991, LECT NOTES COMPUT SC, V547, P535
[3]   Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution [J].
Blundo, C ;
Mattos, LAF ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) :313-334
[4]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[5]  
Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P459
[6]   Tracing traitors [J].
Chor, B ;
Fiat, A ;
Naor, M ;
Pinkas, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) :893-910
[7]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[8]  
D'Arco P, 2003, LECT NOTES COMPUT SC, V2612, P263
[9]  
Dwork C., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P489, DOI 10.1145/237814.237997
[10]   Dynamic traitor tracing [J].
Fiat, A ;
Tassa, T .
JOURNAL OF CRYPTOLOGY, 2001, 14 (03) :211-223