Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme

In 2009, Han et al. proposed an efficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any internal user who has been revoked can not generate a new session key. In this paper,an attack method against this key distribution scheme's forward security was presented. Furthermore, this attack method can also be applied to this scheme's backward security.Thus,the original threshold self-healing key distribution scheme is insecure.

[1]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[2]  Ju-Sung Kang,et al.  An efficient key distribution scheme with self-healing property , 2005, IEEE Communications Letters.

[3]  Alfredo De Santis,et al.  Design of Self-Healing Key Distribution Schemes , 2004, Des. Codes Cryptogr..

[4]  Lin Dongdai,et al.  An improved efficient self-healing group key distribution , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[5]  Song Han,et al.  Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks , 2009, IEEE Transactions on Wireless Communications.

[6]  Xuemin Shen,et al.  Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.

[7]  Yuan-Shun Dai,et al.  A Robust and Stateless Self-Healing Group Key Management Scheme , 2006, 2006 International Conference on Communication Technology.

[8]  Sourav Mukhopadhyay,et al.  Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability , 2007, ISPA.

[9]  Jessica Staddon,et al.  Sliding-window self-healing key distribution , 2003, SSRS '03.

[10]  Germán Sáez On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.

[11]  Carlo Blundo,et al.  A flaw in a self-healing key distribution scheme , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[12]  Alfredo De Santis,et al.  On Self-Healing Key Distribution Schemes , 2006, IEEE Transactions on Information Theory.

[13]  Matthew K. Franklin,et al.  Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.