Key management for secure multicast communication using secret sharing-based revocation scheme1

Author(s):  
Liu Xinxing ◽  
Yang Ming ◽  
Wang Xiaokang
Author(s):  
Win Aye ◽  
Mohammad Umar Siddiqi

Multicast communication demands scalable security solutions for group communication infrastructure. Secure multicast is one such solution that achieves the efficiency of multicast data delivery. Key generation plays an important role in enforcing secure and efficient key distribution. This chapter addresses the issues focused on the area of key generation on key management cryptographic algorithms that support security requirements in multicast group communications. These issues are of importance to application developers wishing to implement security services for their multicast applications. The three main classes, centralized, decentralized, and distributed architectures, are investigated and analyzed here and an insight given to their features and goals. The area of group key generation is then surveyed and proposed solutions are classified according to the efficiency of the cryptographic algorithms and multicast security requirements. We also outline the open problems in this area.


2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Sign in / Sign up

Export Citation Format

Share Document