A matrix key-distribution scheme
Article
Received:
Revised:
- 140 Downloads
- 36 Citations
Abstract
A new key-distribution scheme is presented. It is based on the distinctive idea that lets each node have a set of keys of which it shares a distinct subset with every other node. This has the advantage that the numbers of keys that must be generated is proportional to the number of nodes. Moreover, two nodes can start a session with virtually no delay. The scheme suits an environment where there is a certain level of trust among the insiders. The security property to an outsider remains identical to that of other existing schemes. Two versions of the scheme are given. Analysis of security and performance shows it is a practical solution to some key-distribution problems.
Key words
Communication security Private-key cipher Session key Key distributionPreview
Unable to display preview. Download preview PDF.
References
- [1]R. Blom, An Optimal Class of Symmetric Key Generation Systems,Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 335–338.Google Scholar
- [2]W. Diffie and M. E. Hellman, New Directions in Cryptography,IEEE Transactions on Information Theory, vol. 22, no. 6, December 1976, pp. 644–654.CrossRefGoogle Scholar
- [3]T. Matsumto and H. Imai, On the Key Predistribution System: A Practical Solutions to the Key Distribution Problem,Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, Berlin, 1987, pp. 185–193.Google Scholar
- [4]S. M. Matyas and C. H. Meyer, Generation, Distribution, and Installation of Cryptography Keys,IBM Systems Journal, vol. 17, no. 2, 1978, pp. 126–137.Google Scholar
- [5]R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,Communications of the ACM, vol. 21, no. 12, December 1978, pp. 993–999.CrossRefGoogle Scholar
- [6]V. L. Voydock and S. T. Kent, Security Mechanisms in High-Level Network Protocols,ACM Computing Surveys, vol. 15, no. 2, 1983, pp. 135–171.CrossRefGoogle Scholar
Copyright information
© International Association for Cryptologic Research 1990