Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.6.93

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR  

권정옥 (고려대학교 정보보호기술연구센터(CIST))
황정연 (고려대학교 정보보호기술연구센터(CIST))
김현정 (고려대학교 정보보호기술연구센터(CIST))
이동훈 (고려대학교 정보보호기술연구센터(CIST))
임종인 (고려대학교 정보보호기술연구센터(CIST))
Abstract
Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.
Keywords
Multicast; Logical Key Hierarchy; One-way Function;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Key Establishment in Large Dynamic Group s Using One-Way Function Trees /
[ D. A. McGrewa;A. T. Sherman ] / Technical Report
2 EHBT: An Efficient Protocol for Group Key Management /
[ S. Rafaeli;L. Mathy;D. Hutchison;J. Crowcroft(ed.);M. Hofmann(ed.) ] / NGC 2001, LNCS 2233
3 The MD5 Message-Digest Algorithm /
[ R. Rivest ] / RFC 1321
4 Secure Hash Standard /
[ N. F. P ] / National Institute of Standards and Technolgy, U.S. Department of Commerce, DRAFT
5 A Secure Re-keying Scheme with Key Recovery Property /
[ H. Kurnio;R. Safavi-Naini;Huaxiong Wang ] / ACISP 2002, LNCS 2384
6 The VersaKey Framework: Versatile Group Key Management /
[ M. Waldvogel;G. Caronni;D. Sun;N. Weiler;B. Plattner ] / IEEE Journal on Selected Areas in Communications(Special Issue on Middleware)
7 Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques /
[ I. Chang;R. Engel;D. Kandlur;D. Pen darakis;D. Saha ] / Proceedings of INFOCOM'99
8 Key Management for Multicast: Issues and Architectures /
[ D. Wallner;E. Harder;R. Agree ] / RFC 2627
9 Mul ticast Security: A Taxonomy and Some Effcient Constructions /
[ R. Canetti;J. Garay;G. Itkis;D. Micciancio;M. Naorr;B. Pinkas ] / Proc. of IN FOCOM 99
10 /
[ B. Schneier ] / Applied Cryptography Sec ond Edition: Protocols, algorithms, and source code in C
11 /
[ W. Stallings ] / Cryptography and Network Security
12 Cryptographic Hash Functions: A survey /
[ S. Bakhtiari;R. Safavi-Naini;J. Pieprz yk ] / University of Wollongong, Technical Report
13 /
[ I.-J. Group ] / IAIK, java-crypto toolkit