2009 Second International Conference on the Applications of Digital Information and Web Technologies 2009
DOI: 10.1109/icadiwt.2009.5273855
|View full text |Cite
|
Sign up to set email alerts
|

Trade-off between collusion resistance and user life cycle in self-healing key distributions with t-revocation

Abstract: Abstract-We solve the problem of resisting the collusion attack in the one-way hash chain based self-healing key distributions introduced by Dutta et al., coupling it with the prearranged life cycle based approach of Tian et al. that uses the same self-healing mechanism introduced in Dutta et al. Highly efficient schemes are developed compared to the existing works with the trade-off in pre-arranged life cycles on users by the group manager and a slight increase in the storage overhead. For scalability of busi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In [ 17 19 ], the pre-arranged life cycle-based SGKD schemes were proposed to make those HC-SGKD schemes resist to the collusion attack. However, these schemes can only apply to the scenario in which the user's life cycle is pre-determined, and the collusion of revoked users within the life cycles and new joined users can recover unauthorized session keys.…”
Section: Introductionmentioning
confidence: 99%
“…In [ 17 19 ], the pre-arranged life cycle-based SGKD schemes were proposed to make those HC-SGKD schemes resist to the collusion attack. However, these schemes can only apply to the scenario in which the user's life cycle is pre-determined, and the collusion of revoked users within the life cycles and new joined users can recover unauthorized session keys.…”
Section: Introductionmentioning
confidence: 99%
“…In this scheme, users use the secret sharing to bind the user's capability of recovering lost session keys to the user's membership, but this scheme has high overheads of storage and communication. Then, based on the work in , several improved self‐healing key management schemes have been proposed .…”
Section: Introductionmentioning
confidence: 99%
“…However, Dutta et al pointed out that although these schemes guarantee forward and backward secrecy, they cannot resist to the collusion attack in which revoked users colluding with newly joined users access unauthorized information of session keys (see for the definition of this kind of collusion attack). In , the pre‐arranged life cycle‐based group key management schemes were proposed to make those hash chain‐based schemes resist to collusion attack. The GM assigns a pre‐arranged life cycle to each user in the setup phase, and the user cannot be revoked within the life cycle.…”
Section: Introductionmentioning
confidence: 99%