Abstract
This paper proposes a group key distribution scheme with an “entity revocation”, which renews a group key of all the entities except one (or more) specific entity (ies). In broadcast systems such as Pay-TV, Internet multicast and mobile telecommunication for a group, a manager should revoke a dishonest entity or an unauthorized terminal as soon as possible to protect the secrecy of the group communication. However, it takes a long time for the “entity revocation” on a large group, if the manager distributes a group key to each entity except the revoked one. A recently published paper proposed a group key distribution scheme in which the amount of transmission and the delay do not rely on the number of entities of the group, using a type of secret sharing technique. This paper devises a novel key distribution scheme with “entity revocation” that makes frequent key distribution a practical reality. This scheme uses a technique similar to “threshold cryptosystems” and the one-pass Diffie-Hellman key exchange scheme.
Chapter PDF
Similar content being viewed by others
Keywords
- Secret Sharing Scheme
- Discrete Logarithm Problem
- Group Scale
- Elliptic Curve Cryptosystems
- Broadcast Data
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Asmuth, C., Bloom, J.: A Modular Approach to Key Safeguarding. IEEE Trans. On Information Theory IT-29(2), 208–210 (1983)
Burmester, M., vo Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: Advances in Cryptology-EUROCRYPT 1994, pp. 275–285. Springer, Heidelberg (1994)
Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Advances in Cryptology: Proceedings of CRYPTO 1998, pp. 13–25. Springer, Heidelberg (1986)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469–472 (1985)
Hastd, J.: On using RSA with low exponent in a public key network. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 403–408. Springer, Heidelberg (1986)
Hwang, M., Yang, W.: Conference key distribution schemes for secure digital mobile communications. IEEE Journal on Selected Areas in Communications 13(2) (February 1995)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Trans. Inform. Theory IT-28, 714–720 (1982)
Kurosawa, K., Desmedt, Y.: Optimum Traitor Tracing and Asymmetric Scheme. In: Advances in Cryptology-EUROCRYPT 1998, pp. 145–157. Springer, Heidelberg (1998)
Matsuzaki, N., Anzai, J.: Secure Group Key Distribution Schemes with Terminal Revocation. In: Proceedings of 1998 First Japan- Singapore Joint Workshop on Information Security, pp. 37–44 (1998)
Simmons, G.J.: A ’Weak’ privacy protocol using the RSA cryptosystem. Cryptologia 7(2), 180–182 (1983)
Shamir, A.: How to share a secret. Comm. Assoc. Comput. Mach. 22(11), 612–613 (1979)
Nyberg, K., Rueppel, R.A.: Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 182–193. Springer, Heidelberg (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anzai, J., Matsuzaki, N., Matsumoto, T. (1999). A Quick Group Key Distribution Scheme with “Entity Revocation”. In: Lam, KY., Okamoto, E., Xing, C. (eds) Advances in Cryptology - ASIACRYPT’99. ASIACRYPT 1999. Lecture Notes in Computer Science, vol 1716. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-48000-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-48000-6_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66666-0
Online ISBN: 978-3-540-48000-6
eBook Packages: Springer Book Archive