• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Group Key Management based on (2, 2) Secret Sharing

Vol. 8, No. 3, March 30, 2014
10.3837/tiis.2014.03.025, Download Paper (Free):

Abstract

In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
L. Wuu, C. Hung, W. Kuo, "Group Key Management based on (2, 2) Secret Sharing," KSII Transactions on Internet and Information Systems, vol. 8, no. 3, pp. 1144-1156, 2014. DOI: 10.3837/tiis.2014.03.025.

[ACM Style]
Lih-Chyau Wuu, Chi-Hsiang Hung, and Wen-Chung Kuo. 2014. Group Key Management based on (2, 2) Secret Sharing. KSII Transactions on Internet and Information Systems, 8, 3, (2014), 1144-1156. DOI: 10.3837/tiis.2014.03.025.

[BibTeX Style]
@article{tiis:20492, title="Group Key Management based on (2, 2) Secret Sharing", author="Lih-Chyau Wuu and Chi-Hsiang Hung and Wen-Chung Kuo and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2014.03.025}, volume={8}, number={3}, year="2014", month={March}, pages={1144-1156}}