DocumentCode
568434
Title
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation
Author
Chen, Yi-Ruei ; Tzeng, Wen-Guey
Author_Institution
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
fYear
2012
fDate
25-27 June 2012
Firstpage
295
Lastpage
302
Abstract
With the rapid development of the Internet, many commercial and network-based services, such as pay-TV and on-line games, have become popular. To control access to these services for legal members only, a common way is to use a cryptographic key to protect the communication and disclose the key only to the group of legal members. The group key management (GKM) is for a group manager to maintain a common cryptographic (group) key for a dynamic group of legal members through a network channel. A GKM scheme can also be used to provide communication privacy and transmitted message integrity. In this paper, we first demonstrate a collusion attack against Chen, et al.´s concrete RSA-based GKM scheme [1]. Then, we propose an efficient and provably-secure GKM scheme using the key derivation method. Our GKM scheme has some attractive features. Firstly, the proposed scheme are very efficient since the key derivation method uses simple keyed hash plus XOR operations. Secondly, the proposed scheme have an efficient rekey mechanism for a member who may become off-line and miss group key updates in his off-line period. Finally, the proposed scheme can be proved secure based on the pseudorandom function family assumption and one-way property of a hash function.
Keywords
Internet; authorisation; computer network security; data privacy; private key cryptography; telecommunication channels; Internet; RSA-based GKM scheme; collusion attack; communication privacy; cryptographic key; hash function; hash plus XOR operations; key derivation method; legal members group; message integrity transmission; miss group key updates; network channel; network-based services; provably-secure GKM scheme; pseudorandom function; secure group key management scheme; Concrete; Encryption; Law; Privacy; Group key management; key derivation; key distribution; multi-cast security;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.138
Filename
6295988
Link To Document