Analysis and Improvement of Key Distribution Scheme for Secure Group Communication

作者: Jia Ning Luo , Ming Hour Yang

DOI: 10.1155/2016/2750268

关键词: Group CoordinatorEncryptionForward secrecyKey distributionComputer scienceComputer securityVulnerability (computing)Session (computer science)SecrecyCommunication in small groups

摘要: In a secure group communication, messages between coordinator and members are protected by session keys. If group’s membership changes, the keys should be updated to insure forward secrecy backward secrecy. Zhou Huang proposed key-updated scheme based on ciphertext-policy attribute encryption algorithm improve security of key-update mechanism, but their is vulnerable: malicious member may send forged control group. this paper, we analyze vulnerability in Huang’s propose an enhanced scheme. our scheme, only initiator can update verification mechanism improved prevent insiders from controlling We also give performance analysis

参考文章(17)
Xiaohui Liang, Kuan Zhang, Xuemin Shen, Xiaodong Lin, Security and privacy in mobile social networks: challenges and solutions IEEE Wireless Communications. ,vol. 21, pp. 33- 41 ,(2014) , 10.1109/MWC.2014.6757895
Zhibin Zhou, Dijiang Huang, An Optimal Key Distribution Scheme for Secure Multicast Group Communication international conference on computer communications. pp. 331- 335 ,(2010) , 10.1109/INFCOM.2010.5462217
Zhen Liu, Zhenfu Cao, D. S. Wong, White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 76- 88 ,(2013) , 10.1109/TIFS.2012.2223683
Zhiguo Wan, Jun'e Liu, Robert H. Deng, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 743- 754 ,(2012) , 10.1109/TIFS.2011.2172209
E. J. McCluskey, Minimization of Boolean Functions* Bell System Technical Journal. ,vol. 35, pp. 1417- 1444 ,(1956) , 10.1002/J.1538-7305.1956.TB03835.X
Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner, Keys under doormats Communications of The ACM. ,vol. 58, pp. 24- 26 ,(2015) , 10.1145/2814825
Baodong Qin, Robert H Deng, Shengli Liu, Siqi Ma, None, Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 1384- 1393 ,(2015) , 10.1109/TIFS.2015.2410137
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, Key management for secure lnternet multicast using Boolean function minimization techniques international conference on computer communications. ,vol. 2, pp. 689- 698 ,(1999) , 10.1109/INFCOM.1999.751455
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11