The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2010 vol.59)
pp: 842-846
Lein Harn , University of Missouri-Kansas City, Kansas City
Changlu Lin , Graduate University of Chinese Academy of Sciences, Beijing
ABSTRACT
Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key; but unauthorized users cannot recover the group key. The confidentiality of this transformation is information theoretically secure. We also provide authentication for transporting this group key. Goals and security threats of our proposed group key transfer protocol will be analyzed in detail.
INDEX TERMS
Group key transfer protocol, session key, secret sharing, confidentiality, authentication.
CITATION
Lein Harn, Changlu Lin, "Authenticated Group Key Transfer Protocol Based on Secret Sharing", IEEE Transactions on Computers, vol.59, no. 6, pp. 842-846, June 2010, doi:10.1109/TC.2010.40
REFERENCES
[1] G.R. Blakley, "Safeguarding Cryptographic Keys," Proc. Am. Federation of Information Processing Soc. (AFIPS '79) Nat'l Computer Conf., vol. 48, pp. 313-317, 1979.
[2] S. Berkovits, "How to Broadcast a Secret," Proc. Eurocrypt '91 Workshop Advances in Cryptology, pp. 536-541, 1991.
[3] R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Proc. Eurocrypt '84 Workshop Advances in Cryptology, pp. 335-338, 1984.
[4] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly Secure Key Distribution for Dynamic Conferences," Information and Computation, vol. 146, no. 1, pp. 1-23, Oct. 1998.
[5] C. Boyd, "On Key Agreement and Conference Key Agreement," Proc. Second Australasian Conf. Information Security and Privacy (ACISP '97), pp. 294-302, 1997.
[6] E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, "Provably Authenticated Group Diffie-Hellman Key Exchange," Proc. ACM Conf. Computer and Comm. Security (CCS '01), pp. 255-264, 2001.
[7] E. Bresson, O. Chevassut, and D. Pointcheval, "Provably-Secure Authenticated Group Diffie-Hellman Key Exchange," ACM Trans. Information and System Security, vol. 10, no. 3, pp. 255-264, Aug. 2007.
[8] J.M. Bohli, "A Framework for Robust Group Key Agreement," Proc. Int'l Conf. Computational Science and Applications (ICCSA '06), pp. 355-364, 2006.
[9] M. Burmester and Y.G. Desmedt, "A Secure and Efficient Conference Key Distribution System," Proc. Eurocrypt '94 Workshop Advances in Cryptology, pp. 275-286, 1994.
[10] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. IEEE INFOCOM '99, vol. 2, pp. 708-716, 1999.
[11] J.C. Cheng and C.S. Laih, "Conference Key Agreement Protocol with Non Interactive Fault-Tolerance Over Broadcast Network," Int'l J. Information Security, vol. 8, no. 1, pp. 37-48, 2009.
[12] W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
[13] M. Eltoweissy, M.H. Heydari, L. Morales, and I.H. Sudborough, "Combinatorial Optimization of Group Key Management," J. Network and Systems Management, vol. 12, no. 1, pp. 33-50, 2004.
[14] A. Fiat and M. Naor, "Broadcast Encryption," Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '93), pp. 480-491, 1994.
[15] H. Harney, C. Muckenhirn, and T. Rivers, "Group Key Management Protocol (GKMP) Architecture," RFC 2094, July 1997.
[16] K.H. Huang, Y.F. Chung, H.H. Lee, F. Lai, and T.S. Chen, "A Conference Key Agreement Protocol with Fault-Tolerant Capability," Computer Standards and Interfaces, vol. 31, pp. 401-405, Jan. 2009.
[17] IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements, 2004.
[18] I. Ingemarsson, D.T. Tang, and C.K. Wong, "A Conference Key Distribution System," IEEE Trans. Information Theory, vol. IT-28, no. 5, pp. 714-720, Sept. 1982.
[19] J. Katz and M. Yung, "Scalable Protocols for Authenticated Group Key Exchange," J. Cryptology, vol. 20, pp. 85-113, 2007.
[20] C. Laih, J. Lee, and L. Harn, "A New Threshold Scheme and Its Application in Designing the Conference Key Distribution Cryptosystem," Information Processing Letters, vol. 32, pp. 95-99, 1989.
[21] C.H. Li and J. Pieprzyk, "Conference Key Agreement from Secret Sharing," Proc. Fourth Australasian Conf. Information Security and Privacy (ACISP '99), pp. 64-76, 1999.
[22] A. Perrig, D. Song, and J.D. Tygar, "Elk, A New Protocol for Efficient Large-Group Key Distribution," Proc. IEEE Symp. Security and Privacy, pp. 247-262, 2001.
[23] M.O. Rabin, "Digitized Signatures and Public-Key Functions As Intractable As Factorization," Technical Report LCS/TR-212, MIT Laboratory for Computer Science, 1979.
[24] R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, 1978.
[25] G. Saze, "Generation of Key Predistribution Schemes Using Secret Sharing Schemes," Discrete Applied Math., vol. 128, pp. 239-249, 2003.
[26] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
[27] A.T. Sherman and D.A. McGrew, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
[28] D.G. Steer, L. Strawczynski, W. Diffie, and M.J. Wiener, "A Secure Audio Teleconference System," Proc. Eighth Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '88), pp. 520-528, 1988.
[29] M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," Proc. Third ACM Conf. Computer and Comm. Security (CCS '96), pp. 31-37, 1996.
[30] D.R. Stinson, Cryptography Theory and Practice, second ed., CRC Press, 2002.
[31] W.G. Tzeng, "A Secure Fault-Tolerant Conference Key Agreement Protocol," IEEE Trans. Computers, vol. 51, no. 4, pp. 373-379, Apr. 2002.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool