A flaw in a self-healing key distribution scheme

被引:8
作者
Blundo, C [1 ]
D'Arco, P [1 ]
Listo, M [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
来源
2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS | 2003年
关键词
D O I
10.1109/ITW.2003.1216720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A self-heating key distribution scheme enables a dynamic group of users to establish a group key over an unreliable channel. In such a scheme, a group manager, to distribute a session key to each member of the group, broadcasts packets along the channel. If some packet get lost, users are still capable of recovering the group key using the received packets, without requesting additional transmission from the group manager. A user must be member both before and after the session in which a particular key is sent in order to recover the key through "self-healing". This novel and appealing approach to key distribution is quite suitable in military applications and in several Internet-related settings, where high security requirements should be satisfied. In this paper we show a ciphertext-only attack that applies to a proposed scheme.
引用
收藏
页码:163 / 166
页数:4
相关论文
共 37 条
  • [1] Anzai J, 1999, LECT NOTES COMPUT SC, V1716, P333
  • [2] BERKOVITS S, 1991, LECT NOTES COMPUT SC, V547, P535
  • [3] Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
    Blundo, C
    Mattos, LAF
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) : 313 - 334
  • [4] BLUNDO C, 1995, LECT NOTES COMPUTER, V950, P287
  • [5] Multicast security: A taxonomy and some efficient constructions
    Canetti, R
    Garay, J
    Itkis, G
    Micciancio, D
    Naor, M
    Pinkas, B
    [J]. IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 708 - 716
  • [6] Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P459
  • [7] Tracing traitors
    Chor, B
    Fiat, A
    Naor, M
    Pinkas, B
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 893 - 910
  • [8] Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
  • [9] DARCO P, 2003, TRACK RSA C 2003 CT
  • [10] DICRESCENZO G, 2002, LECT NOTES COMPUTER