Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2002.9C.3.331

The Design of Security Protocol for An Efficient Distribution and Renewal Method of Group Key  

O, Myeong-Uk (Graduate School of Chosun University)
Kim, Seong-Yeol (Dept.of Computer Information, Ulsan College)
Bae, Yong-Geun (Dept.of Computer Engineering, Chosun University)
Jeong, Il-Yong (Dept.of Computer Engineering, Chosun University)
Abstract
In this paper, we propose a new distribution and renewal scheme for a group key suitable for secure mobile communications based on identification protocol, in which all members of the group can reshare the new group common key except revoked members by using a key distribution center (a trusted center). The security of this scheme is based on the difficulty of the discrete logarithm problem. The proposed scheme can be appropriately managed in case that terminal's capability of storage and computing power is relatively small and more than one caller are revoked. It also renews a group key easily when the center changes this key intervally for security.
Keywords
Identification Protocol; Distribution and Renewal of Group Key;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 TIA/EIA Telecommunications Systems Bulletin, Cellular Radio Telecommunications Intersystem Operations : Authentication, Signaling Message Encryption and Voice Privacy, TSB 51, 1995
2 ETSI-RES, European Telecommunication Standard, ETS300 175-7, DECT, Common Interface, part7 : Security features, 1992
3 M. Tatebayashi, N. Matsuzaki, and D. B. Newman, Jr., 'Key distribution Protocol for digital mobile communication systems,' Proc. Crypto 1986, pp.324-333, 1990
4 문태욱, 박상우, 이정숙, 조성준, '디지털 이동통신 시스템에서 스마트 카드를 이용하는 키 분배 프로토콜', 한국통신정보보호학회논문지, 제4권 제2호, pp.3-16, 1994   과학기술학회마을
5 W. Diffie and M. Hellman, 'New Directions in Cryptography,' IEEE Trans. Inform. Th., Vol.22, pp.644-654, 1976   DOI
6 N. Matsuzaki and J. Anzai, 'A Group Key Renewal Method Suitable for Mobile Telecommunications,' Proceedings of SCIS98, 5.2.E., 1998
7 심주걸, 박춘식, 원동호, '디지털 이동통신시스템에 적합한 그룹 공유키 경신방식', 한국통신정보보호학회논문지제10권 제3호, pp.69-76, 2000   과학기술학회마을
8 박희운, 이임영, '효율적인 이동통신 그룹키 갱신 방식 제안', 한국정보과학회논문지, 제28권 제1호, pp.832-834, 2001
9 T. Hwang, 'Scheme for Secure Digital Mobile Communications Based on Symmetric key Cryptography,' Information Processing Letters, 48, pp.35-37, 1993   DOI   ScienceOn
10 W. Diffie, P. C. Oorschot, M. J. Wiener, 'Authentication and Authenticated Key Exchange,' Designs, Codes and Cryptography, 2, pp.107-125, 1992
11 R. L. Rivest, A Shamir, 'How to expose an eavesdropper,' Communications of the ACM, 27, pp.393-395, 1984   DOI
12 조동욱, 최연이, 김희도, 원동호, '이동통신환경에 적합한 상호 인증을 제공하는 키 분배 프로토콜의 설계', 한국통신정보보호학회논문지, 제10권 제2호, pp.21-29, 2000   과학기술학회마을
13 C. H. Lim, P. J. Lee, 'A Key Recovery Attack on discrete log-based schemes using a prime order subgroup,' Advances in Cryptologycypto 97, Springer-verlag, LNCS 1294, pp.249-263, 1977
14 이필중, 임채훈, '일반화된 Diffie-Hellman 키분배 방식의 안전성 분석', 한국정보통신학회논문지 '97-7 Vol.16, No.7, pp.575-597, 1997   과학기술학회마을
15 A. Fiat and A. Shamir, 'How to prove yourself : Practical Solutions to identification and signature problems,' proc. Crypto 1986, pp.186-194, 1986
16 강창구, '디지털 다중서명 방식과 응용에 관한 연구', 충남대학교 : 공학박사학위논문, 1993
17 M. Burmester, 'On the risk of opening distribution keys,' Advances in Cryptology-Crypto '94, Springer-verlag, LNCS 839, 1994