Conference Key Establishment Using Polynomials
نویسندگان
چکیده
In 1992, Blundo et al. have proposed a non-interactive k-secure m-conference protocol based on an m-variate polynomial over a finite field Fp. The key distribution center (KDC) is responsible to pick a symmetric m-variate polynomial of degree k and generate shares for users. Each share is a symmetric polynomial involving m− 1 variables of degree k, and needs to store the coefficients of such a symmetric polynomial. The storage space of each user is exponentially proportional to both the size of the conference and the security level. This makes their protocol impractical except for the case of the pairwise key distribution of m = 2. In this paper, we propose a non-interactive k-secure m-conference protocol based on a special type of multivariate polynomials of degree k. The advantage of using this type of multivariate polynomials can limit the storage space of each user to be k + 1, the number of the coefficients of a univariate polynomial of degree k, which is independent of the conference size. Furthermore, the shares generated for a k-secure m-conference protocol can support any conference with size t where t ≤ m. We show that the proposed protocol is information-theoretic secure in terms of a concept of homomorphic random source and can resist known shares and known conference keys attacks.
منابع مشابه
Conference key establishment protocol using a multivariate polynomial and its applications
In 1992, a non-interactive k-secure m-conference protocol based on an m-variate polynomial has been proposed. Each user needs to store a (m 1)-polynomial having degree k as a private share. A secret conference key involving m users can be computed by each conference member non-interactively using each private share. There is no overhead to exchange information in order to establish a conference...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملEstablishment of conference keys in heterogeneous networks
In order to secure communication amongst members of a conference, a secret shared by all group members must be established. The Diffie-Hellman problem is often the basis for generating keys in two-party communication, and can also be used to establish conference keys. In heterogeneous networks, many conferences have participants of varying computational power and resources. Most conference keyi...
متن کاملTowards fully collusion-resistant ID-based establishment of pairwise keys
Usually a communication link is secured by means of a symmetric-key algorithm. For that, a method is required to securely establish a symmetrickey for that algorithm. This old key establishment problem is still relevant and of paramount importance both in existing computer networks and new large-scale ubiquitous systems comprising resource-constrained devices. Identity-based pairwise key agreem...
متن کاملTree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a heterogenous network, the participants have different resources. Therefore, different burden should be placed on different participants. However, most protocols did not address this problem. Wade Trappe et. al. address...
متن کامل