Provably secure group key management approach based upon hyper-sphere

Shaohua Tang*, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

23 Citations (Scopus)

Abstract

Secure group communication systems have become increasingly important for many emerging network applications. An efficient and robust group key management approach is indispensable to a secure group communication system. Motivated by the theory of hyper-sphere, this paper presents a new group key management approach with a group controller (GC). In our new design, a hyper-sphere is constructed for a group and each member in the group corresponds to a point on the hyper-sphere, which is called the member's private point. The GC computes the central point of the hyper-sphere, intuitively, whose "distance" from each member's private point is identical. The central point is published such that each member can compute a common group key, using a function by taking each member's private point and the central point of the hyper-sphere as the input. This approach is provably secure under the pseudo-random function (PRF) assumption. Compared with other similar schemes, by both theoretical analysis and experiments, our scheme (1) has significantly reduced memory and computation load for each group member; (2) can efficiently deal with massive membership change with only two re-keying messages, i.e., the central point of the hyper-sphere and a random number; and (3) is efficient and very scalable for large-size groups.

Original languageEnglish
Article number6714432
Pages (from-to)3253-3263
Number of pages11
JournalIEEE Transactions on Parallel and Distributed Systems
Volume25
Issue number12
DOIs
Publication statusPublished - 1 Dec 2014
Externally publishedYes

Keywords

  • Group communication
  • Hyper-sphere
  • Key management
  • Provable security
  • Pseudo-random function (PRF)

Fingerprint

Dive into the research topics of 'Provably secure group key management approach based upon hyper-sphere'. Together they form a unique fingerprint.

Cite this