Premium
A novel self‐healing key distribution scheme based on vector space access structure and MDS codes
Author(s) -
Vadlamudi China Venkaiah,
Vadlamudi Sesha Phani Deepika
Publication year - 2019
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4088
Subject(s) - computer science , multicast , group key , computer network , communication in small groups , replay attack , rekeying , key distribution , correctness , session key , key (lock) , scheme (mathematics) , collusion , secure multicast , distributed computing , theoretical computer science , computer security , algorithm , public key cryptography , key management , mathematics , reliable multicast , encryption , source specific multicast , mathematical analysis , password , economics , microeconomics
Summary Self‐healing group key distribution protocols are useful in applications that have a dynamic group structure. These include broadcast transmission systems and multicast networks such as pay‐per‐view television, embedded and sensor networks, and cellular and wireless networks. To cater to the requirements of these applications, several self‐healing group key distribution protocols are proposed in the literature. Many of these schemes are vulnerable to polynomial factorization or insider replay attacks. Some other schemes impose constraints on the users joining the group or revoked from the group. Motivated by these and other shortcomings of the existing schemes, we hereby propose a novel self‐healing group key distribution protocol. Some of the features of this scheme include that (a) the number and the set of revoked users is not constrained, (b) the communication group can consist of any set of users, and (c) a revoked user is allowed to rejoin the group in any of the later sessions. The scheme is analyzed for its security, and it is found to provide anywise forward and backward secrecy. It is also found to resist anywise collusion attack. Communication and computation complexity of the scheme is analyzed; while doing so, various possible realizations of the scheme is discussed. In addition to the theoretical analysis, the proposed scheme is experimentally verified for its correctness using OMNET++ network simulator.