A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation
In Key Predistribution Scheme(KPS) and One-Time use Broadcast Encryption Schemes(OTBES) a Trusted Authority(TA) generates secret information and distributes part of it to users. It also has to observe users’ dishonest acts to prevent collusion attacks. However, these tasks can be heavy for a TA if there are a large number of users in the system. In this paper, we propose Hierarchically Structured KPS(HS-KPS) as an effective solution for this problem. Then we evaluate its performance in terms of efficiency, security and memory size.
Unable to display preview. Download preview PDF.
- 1.T. Matsumoto and H. Imai, “On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem,” Proc. of CRYPTO’87, LNCS 293, Springer-Verlag, pp.185–193, 1988.Google Scholar
- 2.R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Proc. of Eurocrypt’84, LNCS 209, Springer-Verlag, pp.335–338, 1985.Google Scholar
- 3.C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly Secure Key Distribution for Dynamic Conferences,” Proc. of CRYPTO’ 92, LNCS 740, Springer-Verlag, pp.471–486, 1993.Google Scholar
- 4.C. Blundo, L.A. Frota Mattos and D.R. Stinson, “Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,” Proc. of CRYPTO’96, LNCS 1109, Springer-Verlag, pp. 387–400, 1996.Google Scholar
- 6.W. A. Jackson, K. M. Martin, and C. M. O'Keefe, “Multisecret Threshold Schemes,” Proc. of CRYPTO’93, LNCS 773, pp.126–135, Springer-Verlag, 1994.Google Scholar
- 7.Y. Desmedt and V. Viswanathan, “Unconditionally Secure Dynamic Conference Key Distribution,” IEEE, ISIT’98, 1998.Google Scholar
- 8.A. Fiat and M. Naor, “Broadcast Encryption,” Proc. of CRYPTO’93, LNCS 773, Springer-Verlag, pp.480–491, 1994.Google Scholar
- 9.G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, “An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks,” Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag, pp.348–362, 1999.Google Scholar
- 10.G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, “Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks,” Proc. of The Second International Conference on Information and Communication Security (ICICS’99), LNCS 1726, Springer-Verlag, pp.157–168, 1999.Google Scholar
- 12.K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, “Some Bounds and a Construction for Secure Broadcast Encryption,” Proc. of Asiacrypt’98, LNCS 1514, Springer-Verlag, pp. 420–433, 1998.Google Scholar
- 15.Y. Shibuya, G. Hanaoka and H. Imai, “On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography,” Proc. of Joint Workshop on Information Security and Cryptology 2000 (JWISC2000), pp.207–212, 2000.Google Scholar