Practical Evaluation of Revocation Schemes
نویسنده
چکیده
Group communication and the security thereof constitute two of the most important problems which need to be solved in the future cellular and wireless networks. This is especially true when the group is large and dynamically changing. One way to solve the security problem is to use so-called revocation schemes. However, these schemes do not scale very well and they create large computational costs, large communication overheads and/or memory requirements when the number of users grows. The aim of this Master’s Thesis was to evaluate the practicality of revocation schemes on both a practical and theoretical basis and, specifically, to investigate the possibility of implementing such a system in a future cellular and wireless network. Two different revocation schemes were implemented in the Master’s project, namely the Subset Difference-protocol (SD) and the Logical Key Hierarchy-protocol (LKH). The LKH-protocol was implemented in three versions which gives a total of four different implementations. These implementations were then tested on six different user behaviors and three different user set sizes. The SD-protocol showed superior performance compared to the other protocols on all user patterns except one. The SD-protocol also possesses a few qualitatively very good properties such as statelessness. However, even the SD-protocol’s communication overhead may be too large for low-speed links, and none of the implemented protocols does hence fully suit a cellular or wireless network. These results were all obtained when the dynamics of the group was relatively high. If the dynamics of the group is very low, the LKH-based protocols may be a feasible choice. Praktisk utvärdering av revokeringsprotokoll
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملQuasi-Efficient Revocation of Group Signatures
Several interesting group signature schemes have been proposed todate. However, in order for the entire group signature concept to become practical and credible, the problem of secure and efficient group member revocation must be addressed. In this paper, we construct a new revocation method for group signatures based on the signature scheme by Ateniese et al. [ACJT]. This new method represents...
متن کاملAccumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...
متن کاملTrusted Principal-Hosted Certificate Revocation
Public Key Infrastructure is a key infrastructure for secure and trusted communication on the Internet. This paper revisits the problem of providing timely certificate revocation focusing on the needs of mobile devices. We survey existing schemes then present a new approach where the principal’s server functions as the directory for its own revocation information. We evaluate the properties and...
متن کاملSecure Key-Updating for Lazy Revocation
We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution to user revocation in such systems is lazy revocation, a method that delays the re-encryption of a file until the next write to that file. We formalize the notion of key-updating schemes for lazy revocation, an abstraction to ma...
متن کامل