Title :
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation
Author :
Chen, Yi-Ruei ; Tzeng, Wen-Guey
Author_Institution :
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
With the rapid development of the Internet, many commercial and network-based services, such as pay-TV and on-line games, have become popular. To control access to these services for legal members only, a common way is to use a cryptographic key to protect the communication and disclose the key only to the group of legal members. The group key management (GKM) is for a group manager to maintain a common cryptographic (group) key for a dynamic group of legal members through a network channel. A GKM scheme can also be used to provide communication privacy and transmitted message integrity. In this paper, we first demonstrate a collusion attack against Chen, et al.´s concrete RSA-based GKM scheme [1]. Then, we propose an efficient and provably-secure GKM scheme using the key derivation method. Our GKM scheme has some attractive features. Firstly, the proposed scheme are very efficient since the key derivation method uses simple keyed hash plus XOR operations. Secondly, the proposed scheme have an efficient rekey mechanism for a member who may become off-line and miss group key updates in his off-line period. Finally, the proposed scheme can be proved secure based on the pseudorandom function family assumption and one-way property of a hash function.
Keywords :
Internet; authorisation; computer network security; data privacy; private key cryptography; telecommunication channels; Internet; RSA-based GKM scheme; collusion attack; communication privacy; cryptographic key; hash function; hash plus XOR operations; key derivation method; legal members group; message integrity transmission; miss group key updates; network channel; network-based services; provably-secure GKM scheme; pseudorandom function; secure group key management scheme; Concrete; Encryption; Law; Privacy; Group key management; key derivation; key distribution; multi-cast security;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.138