CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On key distribution via true broadcasting
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
Communications of the ACM
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
An LSB Data Hiding Technique Using Prime Numbers
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
CISIM '08 Proceedings of the 2008 7th Computer Information Systems and Industrial Management Applications
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Generalized self-healing key distribution using vector space access structure
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Self-healing key distribution schemes with sponsorization
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
SCIDS: a soft computing intrusion detection system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
On threshold self-healing key distribution schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Secret sharing schemes with bipartite access structure
IEEE Transactions on Information Theory
ASCDS: a smartphone confidential data storage scheme
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
A fundamental concern of any secure group communication system is key management and wireless environments create new challenges. One core requirement in these emerging networks is self-healing. In systems where users can be offline and miss updates, self-healing allows a user to recover lost session keys and get back into the secure communication without putting extra burden on the group manager. Clearly, self-healing must only be available to authorised users. This paper fixes the problem of collusion attack in an existing self-healing key distribution scheme and provides a highly efficient scheme as compared to the existing works. It is computationally secure, resists collusion attacks made between newly joined users and revoked users and achieves forward and backward secrecy. Our security analysis is in an appropriate security model. Unlike the existing constructions, our scheme does not forbid revoked users from rejoining in later sessions.