Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere

نویسندگان

  • Shaohua Tang
  • Jintai Ding
  • Zhiming Yang
چکیده

Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach is essential. In this paper, a new group key management approach with a group controller GC using the theory of hyper-sphere is developed, where a hyper-sphere is constructed for the group and each member in the group corresponds to a point on the hyper-sphere, which can be called the member’s private point. The GC computes the central point of the hyper-sphere, whose distance from each member’s private point is identical. The central point is published and each member can compute a common group key via the square of the radius. The security relies on the fact that any illegitimate user cannot calculate this value without the legitimate vector, therefore cannot derive the group key. This approach is secure and its backward and forward secrecy can be guaranteed. The performance of our approach is analyzed to demonstrate its advantages in comparison with others, which include: 1) it requires both small memory and little computations for each group member; 2) it can handle massive membership change efficiently with only two re-keying messages, i.e., the central point of the hyper-sphere and a random number; 3) it is very efficient and very scalable for large size groups. Our experiments confirm these advantages and the implementation of our prototype presents very satisfactory performance for large size groups.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast

In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency ...

متن کامل

Performance Optimizations for Group Key Management Schemes for Secure Multicast

Scalable group rekeying is one of the biggest challenges that need to be addressed to support secure communications for large and dynamic groups. In recent years, many group key management approaches based on the use of logical key trees have been proposed to address this issue. Using logical key trees reduces the complexity of group rekeying operation from O(N) to O(logN), where N is the group...

متن کامل

A PSO Based Incremental Hyper-Sphere Partitioning Approach to Classification

This paper proposes an incremental hyper-sphere partitioning approach for classification problems. Hyperspheres that are close to the classification boundaries of a given problem are searched using an incremental approach based upon Particle Swarm Optimization (PSO). This new algorithm is proposed to tackle the difficulty of classification problems caused by the complex pattern relationship wit...

متن کامل

An Efficient and Secure Multicast Key Management Scheme based on Star Topology

The today’s world relies heavily over the applications, such as e-commerce, which are using the multicast communications, carried out over the insecure channel like internet, henceforth, the need for secure group communication is realized. The secure group communication helps in transmitting data in such a way that only the members of the group are able to receive the message. In 2012, K. Sarav...

متن کامل

Three-dimensional characteristic approach for incompressible thermo-flows and influence of artificial compressibility parameter

In this paper the characteristics of unsteady three-dimensional incompressible flows with heat transfer are obtained along with artificial compressibility of Chorin. At first, compatibility equations and pseudo characteristics for three-dimensional flows are derived from five governing equations (continuity equation, Momentum equations in three directions, and energy equation) and then results ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011