Communication Complexity of Group Key
نویسندگان
چکیده
LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by reprints or legally obtained copies of the article (e.g., payment of royalties). Abstract Communication complexity has always been an important issue when designing group key distribution systems. This paper systematically studies what can be achieved for the most common measures of protocol complexity. Lower bounds for the total number of messages, the total number of exchanges, and the number of necessary rounds are established, whereby models that allow broadcasting have to be distinguished from those that do not. For every measure of protocol complexity, we furthermore show that the corresponding bound is realistic for Diie{Hellman-based protocols by referring to or introducing protocols that match the bound or exceed it by only one.
منابع مشابه
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملA Group Key Management Scheme Based on Random Transmission for VANET
Group key management plays an important role in ensuring the safety and reliability of the VANET (vehicular ad-hoc network) over the channel. Through considering the characteristics of VANET communication and topology, a VANET group key management scheme is proposed based on random transmission which is combined with the construction of polynomial and key updating by Hash chain. The scheme achi...
متن کاملComputation-efficient key establishment in wireless group communications
Efficient key establishment is an important problem for secure group communications. The communication and storage complexity of group key establishment problem has been studied extensively. In this paper, we propose a new group key establishment protocol whose computation complexity is significantly reduced. Instead of using classic secret sharing, the protocol only employs a linear secret sha...
متن کاملComputationally effecient group re-keying for time sensitive applications
Key distribution is an important problem for secure group communications. Multicast is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of mu...
متن کاملThe Effects of Task Variation on the Accuracy and Complexity of Iranian EFL Learners’ Oral Performance
Task variation is an integrative method aiming at the importance of learner-to-learner interactions in a wide range of learning contexts and fostering authentic use of language and meaningful communication. This study investigated the impact of task variation on the accuracy and complexity of Iranian EFL learners’ oral speech. In so doing, 80 intermediate EFL learners, majoring English at the I...
متن کاملError Detection and Correction for Distributed Group Key Agreement Protocol
Integrating an efficient Error detection and correction scheme with less encoding and decoding complexity to support the distribution of keying material in a secure group communication is an important issue, since the amount of information carried out in the wireless channel is high which produces more errors due to noise available in the communication channel. Moreover, the key must be sent se...
متن کامل