CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A digital fountain approach to reliable distribution of bulk data
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
Communications of the ACM
Efficient Revocation Schemes for Secure Multicast
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Coding Constructions for Blacklisting Problems without Computational Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Revocation and Tracing Schemes for Stateless Receivers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Quick Group Key Distribution Scheme with "Entity Revocation"
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Towards Making Broadcast Encryption Practical
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
A unified model for unconditionally secure key distribution
Journal of Computer Security
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Hi-index | 0.00 |
A commonly used solution for controlling access to information in a multicast group is to encrypt the data using a group key (session key). The group key is only known by users in the group, but not others. A multicast group is dynamic in the sense that group memberships changes in each session. To start a new session, the session key must be updated through a re-keying scheme. In this paper we propose a re-keying scheme for multiple user revocation and multiple user join. Our construction employs logical key hierarchy in conjunction with oneway hash chain to achieve higher efficiency. We prove that our scheme satisfies forward secrecy, backward secrecy and forward-backward secrecy. We also provide key recovery property which gives a system the ability to recover a session key using the previous and future session keys. We show security of the system.