2008
DOI: 10.1007/978-3-540-79549-0_53
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Self-healing Key Distribution Using Vector Space Access Structure

Abstract: We propose and analyze a generalized self-healing key distribution using vector space access structure in order to reach more flexible performance of the scheme. Our self-healing technique enables better performance gain over previous approaches in terms of storage, communication and computation complexity. We provide rigorous treatment of security of our scheme in an appropriate security framework and show it is computationally secure and achieves forward and backward secrecy. Keywords: key distribution, self… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(40 citation statements)
references
References 7 publications
(22 reference statements)
0
40
0
Order By: Relevance
“…In contrast to the family of the selfhealing key distribution schemes proposed in [5] and [10], our construction provides reduction in the storage overhead, which is one of the main improvement of our scheme over the previous work. Although some previous work based on shamir's secret sharing are more efficient than our scheme, as we have discussed before, these schemes have limitations, i.e., the maximum number of revoked users is constrained by the degree of the polynomial.…”
Section: Performance Analysismentioning
confidence: 60%
See 1 more Smart Citation
“…In contrast to the family of the selfhealing key distribution schemes proposed in [5] and [10], our construction provides reduction in the storage overhead, which is one of the main improvement of our scheme over the previous work. Although some previous work based on shamir's secret sharing are more efficient than our scheme, as we have discussed before, these schemes have limitations, i.e., the maximum number of revoked users is constrained by the degree of the polynomial.…”
Section: Performance Analysismentioning
confidence: 60%
“…Our scheme reduces storage overhead over the previous approaches, resists collusion between the [6] t(m − j + 1) log q 1 2 t(m 2 − m + 2) log q No [10] (m − j + 1) log q (t + 1) log q No [11] (2m + 1) log q (t + 1) log q Yes Our scheme (m − j + 2) log q (t + 1 + j) log q Yes new joined users and the revoked users, and is scalable to very large groups in highly mobile, volatile, and hostile wireless network. Our scheme is analyzed in an appropriate security model to prove that it is computationally secure and achieves both forward and backward secrecy.…”
Section: Discussionmentioning
confidence: 97%
“…Improvements in efficiency are obtained by relaxing the security slightly -from unconditional to computational [13,8,9,15]. The schemes [19,20,25,9] are based on vector space access structure instead of Shamir's [21] secret sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Improvements in efficiency are obtained by relaxing the security slightly -from unconditional to computational [13,8,9,15]. The schemes [19,20,25,9] are based on vector space access structure instead of Shamir's [21] secret sharing. The hash chain based schemes [13,8,9,15] are computationally secure and are highly efficient compared to the existing unconditionally secure schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation