Abstract | ||
---|---|---|
In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks. |
Year | DOI | Venue |
---|---|---|
2016 | 10.3837/tiis.2016.02.027 | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS |
Keywords | Field | DocType |
Group Key Distribution,Key Agreement,Authentication,Linear Equations | Group key,Key distribution,Authentication,Cryptography,Computer security,Computer science,Key encapsulation,Computer network,Secure multicast,Multicast,Group key distribution,Distributed computing | Journal |
Volume | Issue | ISSN |
10 | 2 | 1976-7277 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Run-hua Shi | 1 | 78 | 13.07 |
Hong Zhong | 2 | 90 | 18.46 |
Shun Zhang | 3 | 226 | 27.93 |