Browse > Article
http://dx.doi.org/10.3837/tiis.2014.03.025

Group Key Management based on (2, 2) Secret Sharing  

Wuu, Lih-Chyau (Graduate School of Computer Science and Information Engineering, National Yunlin University of Science and Technology)
Hung, Chi-Hsiang (Graduate School of Engineering Science and Technology-Doctoral Program, National Yunlin University of Science and Technology)
Kuo, Wen-Chung (Graduate School of Computer Science and Information Engineering, National Yunlin University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.3, 2014 , pp. 1144-1156 More about this Journal
Abstract
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.
Keywords
Group key management; dynamic group; mutual authentication; secret sharing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ateniese G, Steiner M, Tsudik G. "New multiparty authentication services and key agreement protocols, " IEEE Journal on Selected Areas in Communications , Vol. 18, No.4, pp.628-639, April, 2000.   DOI   ScienceOn
2 Daza V, Herranz J, Saez G. "On the computational security of a distributed key distribution scheme," IEEE Transactions on Computers, Vol.57, No.8, pp.1087-1097, August, 2008.   DOI   ScienceOn
3 Pham T, Watters PA. "The efficiency of periodic rekeying in dynamic group key management," in Proc. of 4th European Conf. on Universal Multiservice Networks, pp.425-432, February, 2007.
4 Shamir A. "How to share a secret," Communications of the ACM, Vol.22, No.11, pp. 612-613, November, 1979.   DOI   ScienceOn
5 Sun Y, Liu KJR. "Hierarchical group access control for secure multicast communications," IEEE/ACM Transactions on Networking, Vol.15, No.6, pp.1514-1526, December, 2007.   DOI   ScienceOn
6 Wuu LC, Chen HC. "A scalable framework for secure group communication," in Proc. of First International Conference on Networking-Part 2, pp.225-238, 2001.
7 Xu L, Huang C. "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19, No.5, pp.577-587, May, 2008.   DOI   ScienceOn
8 Yi X. "Authenticated key agreement in dynamic peer groups," Journal of Theoretical Computer Science, Vol.326, No.1-3, pp.363-382, October, 2004.   DOI   ScienceOn
9 Yu W, Sun Y, Liu KJR. "Optimizing rekeying cost for contributory group key agreement schemes," IEEE Transactions on Dependable and Secure Computing, Vol.4, No.3, pp.228-242, 2007.   DOI   ScienceOn
10 Je DH, Lee JS, Park Y, Seo SW. "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Computer Communications, Vol.33, No.2, pp.136-148, 2010.   DOI   ScienceOn
11 Kulkarni SS, Bruhadeshwar B. "Key-update distribution in secure group communication," Computer Communications, Vol.33, No.6, pp.689-705, April, 2010.   DOI   ScienceOn
12 Wu W, Li M, Chen E. "Optimal tree structures for group key tree management considering insertion and deletion cost," Theoretical Computer Science, Vol.410, No.27-29, pp.2619-2631, June, 2009.   DOI
13 Harney H, Muckenhirn C, Rivers T. "Group key management protocol (GKMP) architecture," RFC 2094, IETF 1997.
14 Naranjo JAM, Antequera N, Casado LG, López-Ramos JA. "A suite of algorithms for key distribution and authentication in centralized secure multicast environments," Journal of Computational and Applied Mathematics, Vol.236, No.12, pp.3042-3051, June, 2012.   DOI   ScienceOn
15 Adusumilli P, Zou X, and Ramamurthy B., "DGKD: distributed group key distribution with authentication capability," in Proc. of the IEEE Workshop on Information Assurance and Security, pp. 286-293, June 15-17, 2005.
16 Harn L, Lin C. "Authenticated group key transfer protocol based on secret sharing," IEEE Transactions on Computers, Vol.59, No.6, pp.842-846, June, 2010.   DOI   ScienceOn
17 Kwak DW, Kim J. "A decentralized group key management scheme for the decentralized P2P environment," IEEE Communications Letters, Vol.11, No.6, pp.555-557, June, 2007.   DOI   ScienceOn
18 Ng WHD, Cruickshank H, Sun Z. "Scalable balanced batch rekeying for secure group communication," Computers and Security, Vol.25, No.4, pp.265-273, June, 2006.   DOI   ScienceOn
19 Ng WHD, Howarth M, Sun Z, Cruickshank H. "Dynamic balanced key tree management for secure multicast communications," IEEE Transactions on Computers, Vol.56, No.5, pp.590-605, May, 2007.   DOI   ScienceOn
20 Parvatha Varthini B, Valli S. "Generation of group key using enhanced one way function tree group rekey protocol," in Proc. of Int. Conf. on Computing: Theory and Applications, pp.176-181, March 5-7, 2007.