Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/40638
DC Field | Value | |
---|---|---|
dc.title | Designing scalable self-healing key distribution schemes with revocation capability | |
dc.contributor.author | Dutta, R. | |
dc.contributor.author | Mukhopadhyay, S. | |
dc.date.accessioned | 2013-07-04T08:08:55Z | |
dc.date.available | 2013-07-04T08:08:55Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | Dutta, R.,Mukhopadhyay, S. (2007). Designing scalable self-healing key distribution schemes with revocation capability. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4742 LNCS : 419-430. ScholarBank@NUS Repository. | |
dc.identifier.isbn | 3540747419 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40638 | |
dc.description.abstract | Self-healing key distribution is a potential candidate to establish session keys for secure communication to large and dynamic groups in highly mobile, volatile and hostile wireless network, where frequent membership changes may be necessary and ability to revoke users during certain exchanges is desirable. The main property of self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to network faults, the users are capable of recovering lost session keys on their own, without requesting additional transmission from the group manager. In this paper, we propose a scalable self-healing key distribution with t revocation capability. Our proposed scheme has improvement in storage overhead over the previous approaches with the same communication cost required by the most optimal previous scheme. The scheme is supported by a proper security analysis in an appropriate security model. We prove that it is unconditionally secure and achieve both forward secrecy and backward secrecy. Our proposed self-healing key distribution is not restricted to m sessions in Setup phase. Besides, we develop a construction for self-healing key distribution that enables key recovery from a single broadcast message. © Springer-Verlag Berlin Heidelberg 2007. | |
dc.source | Scopus | |
dc.subject | Rekeying | |
dc.subject | Revocation | |
dc.subject | Self-healing | |
dc.subject | Session key distribution | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 4742 LNCS | |
dc.description.page | 419-430 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.