An explication of secret sharing schemes
Designs, Codes and Cryptography
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Constructing general dynamic group key distribution schemes with decentralized user join
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
Information Security Applications
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Collusion attack on a self-healing key distribution with revocation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Access polynomial based self-healing key distribution with improved security and performance
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Collusion resistant self-healing key distribution in mobile wireless networks
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
In a self-healing key distribution scheme a group manager enables a large and dynamic group of users to establish a group key over an unreliable network. The group manager broadcasts in every session some packet of information in order to provide a common key to members of the session group. The goal of self-healing key distribution schemes is that, even if the broadcast is lost in a certain session, the group member can recover the key from the broadcast packets received before and after the session. This approach to key distribution is quite suitable for wireless networks, mobile wireless ad-hoc networks and in several Internet-related settings, where high security requirements need to be satisfied. In this work we provide a generalization of previous definitions in two aspects. The first one is to consider general structures instead of threshold ones to provide more flexible performance to the scheme. The second one is to consider the possibility that a coalition of users sponsor a user outside the group for one session: we give the formal definition of self-healing key distribution schemes with sponsorization, some bounds on the required amount of information. We also give a general construction of a family of self-healing key distribution schemes with sponsorization by means of a linear secret sharing scheme. Our construction differs from previous self-healing key distribution schemes in the fact that the length of the broadcast is almost constant. Finally we analyze the particular case of this general construction when Shamir's secret sharing scheme is used.