Communications of the ACM
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A New Self-Healing Key Distribution Scheme
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
Information Security Applications
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Generalized self-healing key distribution using vector space access structure
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Self-healing key distribution schemes with sponsorization
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
On threshold self-healing key distribution schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Hi-index | 0.00 |
In this paper, we develop and analyze a computationally secure self-healing key distribution scheme with revocation capability, adopting the idea of access polynomial and a one-way hash chain. The main emphasis of our proposed scheme is that it achieves a stronger security goal, namely it can resist collusion against any number of users, while having a significant improvement in the communication overhead as compared to the existing schemes. Our design uses constant storage and hence is especially suitable for unreliable environments in which devices have limited resources. The security analysis is in an existing security model.