Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
نویسندگان
چکیده
Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is developed, where a hyper-sphere is constructed for the group and each member in the group corresponds to a point on the hyper-sphere, which can be called the member’s private point. The GC computes the central point of the hyper-sphere, whose distance from each member’s private point is identical. The central point is published and each member can compute a common group key via the square of the radius. The security relies on the fact that any illegitimate user cannot calculate this value without the legitimate vector, therefore cannot derive the group key. This approach is secure and its backward and forward secrecy can be guaranteed. The performance of our approach is analyzed to demonstrate its advantages in comparison with others, which include: 1) it requires both small memory and little computations for each group member; 2) it can handle massive membership change efficiently with only two re-keying messages, i.e., the central point of the hyper-sphere and a random number; 3) it is very efficient and very scalable for large size groups. Our experiments confirm these advantages and the implementation of our prototype presents very satisfactory performance for large size groups.
منابع مشابه
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency ...
متن کاملPerformance Optimizations for Group Key Management Schemes for Secure Multicast
Scalable group rekeying is one of the biggest challenges that need to be addressed to support secure communications for large and dynamic groups. In recent years, many group key management approaches based on the use of logical key trees have been proposed to address this issue. Using logical key trees reduces the complexity of group rekeying operation from O(N) to O(logN), where N is the group...
متن کاملA PSO Based Incremental Hyper-Sphere Partitioning Approach to Classification
This paper proposes an incremental hyper-sphere partitioning approach for classification problems. Hyperspheres that are close to the classification boundaries of a given problem are searched using an incremental approach based upon Particle Swarm Optimization (PSO). This new algorithm is proposed to tackle the difficulty of classification problems caused by the complex pattern relationship wit...
متن کاملAn Efficient and Secure Multicast Key Management Scheme based on Star Topology
The today’s world relies heavily over the applications, such as e-commerce, which are using the multicast communications, carried out over the insecure channel like internet, henceforth, the need for secure group communication is realized. The secure group communication helps in transmitting data in such a way that only the members of the group are able to receive the message. In 2012, K. Sarav...
متن کاملThree-dimensional characteristic approach for incompressible thermo-flows and influence of artificial compressibility parameter
In this paper the characteristics of unsteady three-dimensional incompressible flows with heat transfer are obtained along with artificial compressibility of Chorin. At first, compatibility equations and pseudo characteristics for three-dimensional flows are derived from five governing equations (continuity equation, Momentum equations in three directions, and energy equation) and then results ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011