Self-healing key distribution with revocation

被引:112
作者
Staddon, J [1 ]
Miner, S [1 ]
Franklin, M [1 ]
Balfanz, D [1 ]
Malkin, M [1 ]
Dean, D [1 ]
机构
[1] Xerox Corp, Palo Alto Res Ctr, Palo Alto, CA 94304 USA
来源
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2002年
关键词
D O I
10.1109/SECPRI.2002.1004375
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network. We term our key distribution mechanisms self-healing because users are capable of recovering lost group keys on their own, without requesting additional transmissions from the group manager thus cutting back on network, traffic, decreasing the load on the group manager and reducing the risk of user exposure through traffic analysis. A user must be a member both before and after the session in which a particular key is sent in order to be able to recover the key through self-healing. Binding the ability to recover keys to membership status enables the group manager to use short broadcasts to establish group keys, independent of the group size. In addition, the self-healing approach to key distribution is stateless, meaning that a group member who has been off-line for some time is able to recover new session keys immediately after coming back on-line.
引用
收藏
页码:241 / 257
页数:17
相关论文
共 43 条
[1]  
BEIMEL A, LECT NOTES COMPUTER, V773, P444
[2]  
BELLARE M, 1995, 27 ACM S THEOR COMP
[3]  
BELLARE M, LECT NOTES COMPUTER, V773, P232
[4]  
BERKOVIT S, LECT NOTES COMPUTER, V547, P536
[5]  
BLAKEWILSON S, SEC PROT WORKSH 97
[6]  
BLOM R, ADV CRYPTOLOGY CRYPT, P231
[7]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[8]  
BLUNDO C, 1996, LNCS, V1109, P387, DOI DOI 10.1007/3-540-68697-5
[9]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[10]  
BONEH D, LECT NOTES COMPUTER, V1666, P338