Browse > Article

Decentralized Group Key Management for Untrusted Dynamic Networks  

Hur, Jun-Beom (한국과학기술원 전산학과)
Yoon, Hyun-Soo (한국과학기술원 전산학과)
Abstract
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.
Keywords
Group key management; proxy encryption; secure multicast;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs," ACM SIGCOMM, pp.68-79, 1998
2 A. Perrig, D. Song, and J. D. Tygar. "ELK, a New Protocol for Efficient Large-Group Key Distribution," Proceedings of IEEE Symposium on Security and Privacy, pp.247-262, 2001
3 Y. Tsiounis, M. Yung, "On the Security of ElGamal Based Encryption," Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Lecture Notes in Computer Science 1431, pp.117-134, 1998   DOI
4 T. M. Cover, J. A. Thomas, Elements of Information Theory (second edition), Wiley, 2006
5 A. Ivan, Y. Dodis, "Proxy Cryptography Revisited," Proceedings of the Tenth Network and Distributed System Security Symposium, 2003
6 M. Steiner, G. Tsudik, M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," Proceedings of the 3rd ACM Conference on Computer and Communications Security (ACM CCS), pp.31-37, 1996
7 D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proceedings of Crypto 2001, Lecture Notes in Computer Science 2139, pp. 213-229, 2001   DOI
8 C. Huang, Y. Chiu, K. Chen, C. Lei, "Secure Multicast in Dynamic Environments," Computer Networks, vol.51, pp.2805-2817, 2007   DOI   ScienceOn
9 R. Molva, A. Pannetrat, "Scalable Multicast Scemity in Dynamic Groups," Proceedings of the 6th ACM Conference on Computer and Communications Security (ACM CCS), pp.101-112, 1999
10 I. F. Akyildiz, X. Wang, W. Wang, "Wireless Mesh Networks: A Survey, Computer Networks," vol.47, pp.445~487, 2005   DOI   ScienceOn
11 L. Dondeti, S. Mukherjee, A. Samal, "Scalable Secure One-to-many Group Communication Using Dual Encryption," Computer Communication, vol. 23, pp.1681-1701, 1999   DOI   ScienceOn
12 D. A. McGrew and A. T. Sherman, "Key Establishment in Large Dynamic Groups Using Oneway Function Trees," Tech. Rep. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md
13 R. Cramer, V. Shoup, "Secure Hybrid Encryption from Weakened Key Encapsulation," Proceedings of Crypto, pp.553-571, 2007
14 R Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," Proceedings of IEEE INFOCOM 1999, pp.708-716
15 Y. Chiu, C. Lei, C. Huang, "Secure Multicast Using Proxy Encryption," Proceedings of International Conference on Information and Communications Security, ICIGS 2005, Lecture Notes in Computer Science 3783, pp.280-290, 2005
16 D. R. Stinson, Cryptography Theory and Practice (third edition), Chapman & Hall/CRC, 2006
17 S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.277-288, 1997
18 S. Rafaeli, D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol.35, no.3, pp.309-329, 2003   DOI   ScienceOn