A secure re-keying scheme with key recovery property

Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

13 Citations (Scopus)


A commonly used solution for controlling access to information in a multicast group is to encrypt the data using a group key (session key). The group key is only known by users in the group, but not others. A multicast group is dynamic in the sense that group memberships changes in each session. To start a new session, the session key must be updated through a re-keying scheme. In this paper we propose a re-keying scheme for multiple user revocation and multiple user join. Our construction employs logical key hierarchy in conjunction with oneway hash chain to achieve higher efficiency. We prove that our scheme satisfies forward secrecy, backward secrecy and forward-backward secrecy. We also provide key recovery property which gives a system the ability to recover a session key using the previous and future session keys. We show security of the system.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3–5, 2002 Proceedings
EditorsLynn Batten, Jennifer Seberry
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Number of pages16
ISBN (Electronic)9783540454502
ISBN (Print)3540438610, 9783540438618
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 3 Jul 20025 Jul 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other7th Australasian Conference on Information Security and Privacy, ACISP 2002

Fingerprint Dive into the research topics of 'A secure re-keying scheme with key recovery property'. Together they form a unique fingerprint.

Cite this