Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme

The one-way function tree (OFT) scheme proposed by Balenson et al.is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. Following Horng's claim that the original OFT scheme was vulnerable to a collusion attack, Ku et al.studied the collusion attack on OFT and proposed a solution to prevent the attack. The solution, however, requires to broadcast about h2+ h(his the height of the key tree) keys for every eviction operation, whereas the original OFT scheme only requires about hkeys. This modified OFT scheme thus loses a key advantage that the original OFT has over the logical key hierarchy (LKH) scheme, that is a halving in broadcast size. In this paper, we revisit collusion attacks on the OFT scheme. We generalize the examples of attacks given by Horng and Ku et al.to a generic collusion attack on OFT, and derive necessary and sufficient conditions for such an attack to exist. We then show a solution for preventing collusion attacks while minimizing the average broadcast size. Our simulation results show that the proposed solution allows OFT to outperform LKH in many cases.

[1]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[2]  Himanshu Khurana,et al.  Scalable Group Key Management with Partially Trusted Controllers , 2005, ICN.

[3]  Jianhua Li,et al.  An efficient method of group rekeying for multicast communication , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[4]  Pascal Lorenz,et al.  Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I , 2005, ICN.

[5]  Zongkai Yang,et al.  An efficient batch rekeying scheme based on one-way function tree , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[6]  Feipei Lai,et al.  Efficient Group Key Management Protocol with One-Way Key Derivation , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[7]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[8]  Mostafa H. Ammar,et al.  HySOR: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[9]  Thomas Hardjono,et al.  Multicast and Group Security , 2003 .

[10]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[12]  Gwoboa Horng,et al.  Cryptanalysis of a Key Management Scheme for Secure Multicast Communications , 2002 .

[13]  Wei-Chi Ku,et al.  An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.

[14]  Peter S. Kruus,et al.  A Survey of Multicast Security Issues and Architectures , 1998 .

[15]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[16]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[17]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.