Skip to main content

Enhanced Access Polynomial Based Self-healing Key Distribution

  • Conference paper
Security in Emerging Wireless Communication and Networking Systems (SEWCN 2009)

Abstract

A fundamental concern of any secure group communication system is that of key management. Wireless environments create new key management problems and requirements to solve these problems. One such core requirement in these emerging networks is that of self-healing. In systems where users can be offline and miss updates self healing allows a user to recover lost keys and get back into the secure communication without putting extra burden on the group manager. Clearly self healing must be only available to authorized users and this creates more challenges in that we must ensure unauthorized or revoked users cannot, themselves or by means of collusion, avail of self healing. To this end we enhance the one-way key chain based self-healing key distribution of Dutta et al. by introducing a collusion resistance property between the revoked users and the newly joined users. Our scheme is based on the concept of access polynomials. These can be loosely thought of as white lists of authorized users as opposed to the more widely used revocation polynomials or black lists of revoked users. We also allow each user a pre-arranged life cycle distributed by the group manager. Our scheme provides better efficiency in terms of storage, and the communication and computation costs do not increase as the number of sessions grows as compared to most current schemes. We analyze our scheme in an appropriate security model and prove that the proposed scheme is computationally secure and not only achieving forward and backward secrecy, but also resisting collusion between the new joined users and the revoked users. Unlike most existing schemes the new scheme allows temporary revocation. Also unlike existing schemes, our construction does not collapse if the number of revoked users crosses a threshold value. This feature increases resilience against revocation based denial of service (DOS) attacks and thus improves availability of communication channel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexi, Chor, Goldreich, Schnorr: RSA Rabin Bits are 1/2 + 1/poly(log n) secure. In: Proceedings of the IEEE 25th Annual Symposium on Foundations of Computer Science, pp. 449–557 (1984)

    Google Scholar 

  2. Blundo, C., D’Arco, P., Santis, A., Listo, M.: Design of Self-healing Key Distribution Schemes. Design Codes and Cryptology 32, 15–44 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient Self-Healing Key Distributions with Revocation for Wireless Network using One Way Key Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Dutta, R., Mukhopadhyay, S., Das, A., Emmanuel, S.: Generalized Self-Healing Key Distribution using Vector Space Access Structure. In: Das, A., Pung, H.K., Lee, F.B.S., Wong, L.W.C. (eds.) NETWORKING 2008. LNCS, vol. 4982, pp. 612–623. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  MATH  Google Scholar 

  6. Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Self-healing Property. IEEE Communication Letters 2005, 9, 759–761 (2005)

    Article  Google Scholar 

  7. Liu, D., Ning, P., Sun, K.: Efficient Self-healing Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM CCS 2003, pp. 27–31 (2003)

    Google Scholar 

  8. Saez, G.: On Threshold Self-healing Key Distribution Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 340–354. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy 2002, pp. 224–240 (2002)

    Google Scholar 

  10. Tian, B., Han, S., Dillon, T.-S., Das, S.: A Self-Healing Key Distribution Scheme Based on Vector Space Secret Sharing and One Way Hash Chains. In: Proceedings of IEEE WoWMoM 2008 (2008)

    Google Scholar 

  11. Tipton, H.: Official (ISC)2- Guide to The CISSP-CBK, 1st edn. Auerbach Publications (2006)

    Google Scholar 

  12. Zou, X.K., Dai, Y.S.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: ICCT 2006, vol. 28, pp. 455–459 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dutta, R., Mukhopadhyay, S., Dowling, T. (2010). Enhanced Access Polynomial Based Self-healing Key Distribution. In: Gu, Q., Zang, W., Yu, M. (eds) Security in Emerging Wireless Communication and Networking Systems. SEWCN 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 42. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11526-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11526-4_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11525-7

  • Online ISBN: 978-3-642-11526-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics