Simple ID-Based Key Distribution Scheme

A key distribution scheme is used to distribute a session key for broadcasting systems(multicast communications). None of the existing key distribution schemes with the exception of the Jeong-Kwon-Lee key distribution scheme provide both security against session state reveal attacks and security against long-term key reveal attacks. Unfortunately, the Jeong-Kwon-Lee key distribution scheme suffers from three disadvantages in terms of efficiency unlike the existing schemes: (1) Unscalability for the dynamic user group, (2) Abuse of cryptographic algorithms, and (3) Inefficiency. In this paper, we propose an ID-based key distribution scheme which is secure against session state reveal attacks and long-term key reveal attacks. Also, our scheme offers the scalability, non-usage of additional cryptographic algorithms, and efficiency similar to those of the existing schemes.

[1]  Dong Hoon Lee,et al.  Strong ID-Based Key Distribution , 2008, IEICE Trans. Commun..

[2]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[3]  Haeryong Park,et al.  Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement , 2008, IEICE Trans. Commun..

[4]  Tzonelih Hwang,et al.  Identity-based conference key broadcast systems , 1994 .

[5]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[6]  Kyung-Ah Shim Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme , 2003, IEEE Communications Letters.

[7]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[8]  T. Chikazawa,et al.  Improved identity-based key sharing system for multiaddress communication , 1992 .

[9]  Yuh-Min Tseng,et al.  Improvement of Chikazawa-Yamagishi ID-based key sharing system , 1998 .

[10]  Bae Eun Jung On the forward secrecy of Chikazawa-Yamagishi ID-based key sharing scheme , 2004, IEEE Commun. Lett..

[11]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[12]  T. Chikazawa,et al.  A new key sharing system for global telecommunications , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.

[13]  Atsushi Shimbo,et al.  Cryptanalysis of Several Conference Key Distribution Schemes , 1991, ASIACRYPT.

[14]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[15]  Ying Wang,et al.  An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..