Elements of information theory
Elements of information theory
An explication of secret sharing schemes
Designs, Codes and Cryptography
Communications of the ACM
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Constructing general dynamic group key distribution schemes with decentralized user join
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secret sharing schemes with bipartite access structure
IEEE Transactions on Information Theory
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Flaws in some self-healing key distribution schemes with revocation
Information Processing Letters
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
Information Security Applications
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
IEEE Transactions on Wireless Communications
Generalized self-healing key distribution using vector space access structure
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Collusion attack on a self-healing key distribution with revocation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Access polynomial based self-healing key distribution with improved security and performance
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Collusion resistant self-healing key distribution in mobile wireless networks
International Journal of Wireless and Mobile Computing
Designing scalable self-healing key distribution schemes with revocation capability
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
Self-healing key distribution schemes enables a large and dynamic group of users to establish a group key over an unreliable network. A group manager broadcasts in every session some packet of information in order to provide a common key to members in the session group. The goal of self-healing key distribution schemes is that even if in a certain session the broadcast is lost, the group member can recover the key from the broadcast packet received before and after the session. This approach to key distribution is quite suitable for wireless networks, mobile wireless ad-hoc networks and in several Internet-related settings, where high security requirements need to be satisfied. In this work we provide a generalization of previous definitions in two aspects. The first one is to consider general monotone decreasing structures for the family of subsets of users that can be revoked instead of a threshold one. The objective of this generalization is to reach more flexible performances of the scheme. In the second one, the distance between the broadcasts used to supply the lost one is limited in order to shorten the length of the broadcast information by the group manager. After giving the formal definition of threshold self-healing key distribution schemes, we find some lower bounds on the amount of information used for the system. We also give a general construction that gives us a family of threshold self-healing key distribution schemes by means of a linear secret sharing scheme. We prove the security of the schemes constructed in this way and we analyze the efficiency.