Practical Evaluation of Revocation Schemes

نویسنده

  • MATTIAS JOHANSSON
چکیده

Group communication and the security thereof constitute two of the most important problems which need to be solved in the future cellular and wireless networks. This is especially true when the group is large and dynamically changing. One way to solve the security problem is to use so-called revocation schemes. However, these schemes do not scale very well and they create large computational costs, large communication overheads and/or memory requirements when the number of users grows. The aim of this Master’s Thesis was to evaluate the practicality of revocation schemes on both a practical and theoretical basis and, specifically, to investigate the possibility of implementing such a system in a future cellular and wireless network. Two different revocation schemes were implemented in the Master’s project, namely the Subset Difference-protocol (SD) and the Logical Key Hierarchy-protocol (LKH). The LKH-protocol was implemented in three versions which gives a total of four different implementations. These implementations were then tested on six different user behaviors and three different user set sizes. The SD-protocol showed superior performance compared to the other protocols on all user patterns except one. The SD-protocol also possesses a few qualitatively very good properties such as statelessness. However, even the SD-protocol’s communication overhead may be too large for low-speed links, and none of the implemented protocols does hence fully suit a cellular or wireless network. These results were all obtained when the dynamics of the group was relatively high. If the dynamics of the group is very low, the LKH-based protocols may be a feasible choice. Praktisk utvärdering av revokeringsprotokoll

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Quasi-Efficient Revocation of Group Signatures

Several interesting group signature schemes have been proposed todate. However, in order for the entire group signature concept to become practical and credible, the problem of secure and efficient group member revocation must be addressed. In this paper, we construct a new revocation method for group signatures based on the signature scheme by Ateniese et al. [ACJT]. This new method represents...

متن کامل

Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation

We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...

متن کامل

Trusted Principal-Hosted Certificate Revocation

Public Key Infrastructure is a key infrastructure for secure and trusted communication on the Internet. This paper revisits the problem of providing timely certificate revocation focusing on the needs of mobile devices. We survey existing schemes then present a new approach where the principal’s server functions as the directory for its own revocation information. We evaluate the properties and...

متن کامل

Secure Key-Updating for Lazy Revocation

We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution to user revocation in such systems is lazy revocation, a method that delays the re-encryption of a file until the next write to that file. We formalize the notion of key-updating schemes for lazy revocation, an abstraction to ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004