Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.5.1693

Group Key Generation Scheme using Logical Operation of HashChain and Random Number in Hierarchy Structures  

Kim, Hyun-Chul (Korea Institute of Science and Technology Information)
Lee, Young-Gu (Division of Computer Science, Soongsil University)
Kim, Jung-Jae (Division of Computer Science, Soongsil University)
Lee, Kwang-Hyung (Division of Internet Information, Seoil College)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.5, 2010 , pp. 1693-1701 More about this Journal
Abstract
In this paper, requirements of efficient group key creation in multiple hierarchy structure environment with clear distinction of hierarchical roles within organizations are explained and the method of creating a group key that satisfies such requirements is proposed. The proposed method creates the group key through logical sum operation of hierarchy identifier created using uni-directional hash chain and group identifier randomly created according to the access right. The problem of excessive possession of key information by upper group users in the existing static group key creation technique was resolved. At the same time, lower group users were prevented from deducing key information of upper group users. In addition, as a result of comparative analysis performed with an experiment on existing super group key creation technique and multiple hierarchy group key method, the proposed method was found to be equivalent or superior to existing method in terms of various items including the total number of keys created, the number of keys possessed by users, the number of keys used for encoding and decoding of information, and expandability of keys.
Keywords
Group Key; Hash Chain; Hierarchy Structures; Random Number; Cryptograph;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Gildas Avoine, Philippe Oechslin, "A Scalable and Provably Secure Hash-Based RFID Protocol", Third IEEE International Conference on Pervasive Computing, pp.110-114, 2005.
2 김대엽, 허미숙, 주학수, "효율적인 Batch 처리를 위한 그룹키 관리 기술", 한국정보보호학회논문지, v.18,no.5, pp.189-193, 2008.   과학기술학회마을
3 John Linn, "Trust Models and Management in Public Key Infrastructures", Technical Notes and Reports of RSA Laboratories, 2000.
4 Takeshi Imamura, Blair Dillaway, EdSimon, "XML Encryption Syntax and Processing", W3C Recommendation, 2002.
5 김수희, "의료 환경에 적용 가능한 웹서비스 보안 및 키 관리 기술 연구", 세종대학교대학원석사학위논문, 2007.
6 김진성, "멀티미디어 컨텐츠에 대한 등급별 보안", 경상대학교대학원박사학위논문, 2007.
7 이성은, 장홍종, 박인재, 한선영, "다중 암호화 기법을 활용한 하이브리드 스마트카드 구현", 정보보호학회논문지, 제13권 2호, pp.81-89, 2003.   과학기술학회마을
8 Yih-Chun Hu, Markus Jakobsson and Adrian Perrig,"Efficient Constructions for One-Way Hash Chains" LNCS 3531, pp. 423-441, 2005.
9 김현철, 이창수, 이경석, 전문석, "인증서를 이용한 보안성이 강화된 일회용 패스워드 검증 시스템의 설계" 한국통신학회 논문지, Vol.34 No. 4, pp.435-441, 2009.   과학기술학회마을
10 이성운, 김현성, 유기영, "패스워드 기반의 효율적인키 교환 프로토콜", 한국정보과학회논문지, 정보통신 제31권 제4호, pp.347-352, 2004.   과학기술학회마을
11 최은정, 김찬오, 송주석, "공개키 암호 기법을 이용한 패스워드 기반의 원거지 사용자 인증 프로토콜", 한국정보과학회논문지, 정보통신 제30권 제1호, pp.75-80, 2003.
12 김희열, 이윤호, 박용수, 윤현수, "접근제어를 위한 반응적 방식의 그룹키 관리 기법", 한국정보과학회논문지, 제34권제11호, pp.589-598, 2007.
13 John Linn, "Trust Models and Management in Public Key Infrastructures", Technical Notes and Reports of RSA Laboratories, 2000.
14 Jen-Chiun Lin, Feipei Lai, and Hung-Chang Lee,"Efficient Group Key Management Protocol with One-Way Key Derivation", Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary, 2005.
15 Donald E.Eastlake III, and Kityy Niles, Secure XML: The New Synax for Signatures and Encryption, Pearson Education, 2003.