A secure re-keying scheme with key recovery property

Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)

Abstract

A commonly used solution for controlling access to information in a multicast group is to encrypt the data using a group key (session key). The group key is only known by users in the group, but not others. A multicast group is dynamic in the sense that group memberships changes in each session. To start a new session, the session key must be updated through a re-keying scheme. In this paper we propose a re-keying scheme for multiple user revocation and multiple user join. Our construction employs logical key hierarchy in conjunction with oneway hash chain to achieve higher efficiency. We prove that our scheme satisfies forward secrecy, backward secrecy and forward-backward secrecy. We also provide key recovery property which gives a system the ability to recover a session key using the previous and future session keys. We show security of the system.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3–5, 2002 Proceedings
EditorsLynn Batten, Jennifer Seberry
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages40-55
Number of pages16
Volume2384
ISBN (Electronic)9783540454502
ISBN (Print)3540438610, 9783540438618
DOIs
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 3 Jul 20025 Jul 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2384
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th Australasian Conference on Information Security and Privacy, ACISP 2002
CountryAustralia
CityMelbourne
Period3/07/025/07/02

Fingerprint Dive into the research topics of 'A secure re-keying scheme with key recovery property'. Together they form a unique fingerprint.

Cite this