Self-healing key distribution schemes enables a large and dynamic group of users to establish a group key over an unreliable network. A group manager broadcasts in every session some packet of information in order to provide a common key to members in the session group. The goal of self-healing key distribution schemes is that even if in a certain session the broadcast is lost, the group member can recover the key from the broadcast packet received before and after the session. This approach to key distribution is quite suitable for wireless networks, mobile wireless ad-hoc networks and in several Internet-related settings, where high security requirements need to be satisfied.
In this work we provide a generalization of previous definitions in two aspects. The first one is to consider general monotone decreasing structures for the family of subsets of users that can be revoked instead of a threshold one. The objective of this generalization is to reach more flexible performances of the scheme. In the second one, the distance between the broadcasts used to supply the lost one is limited in order to shorten the length of the broadcast information by the group manager. After giving the formal definition of threshold self-healing key distribution schemes, we find some lower bounds on the amount of information used for the system. We also give a general construction that gives us a family of threshold self-healing key distribution schemes by means of a linear secret sharing scheme. We prove the security of the schemes constructed in this way and we analyze the efficiency.
[1]
Alfredo De Santis,et al.
Definitions and Bounds for Self-Healing Key Distribution Schemes
,
2004,
ICALP.
[2]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[3]
Donggang Liu,et al.
Efficient self-healing group key distribution with revocation capability
,
2003,
CCS '03.
[4]
Douglas R. Stinson,et al.
An explication of secret sharing schemes
,
1992,
Des. Codes Cryptogr..
[5]
Matthew K. Franklin,et al.
Self-healing key distribution with revocation
,
2002,
Proceedings 2002 IEEE Symposium on Security and Privacy.
[6]
Carles Padró,et al.
Secret Sharing Schemes with Bipartite Access Structure
,
1998,
EUROCRYPT.
[7]
Germán Sáez,et al.
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join
,
2003,
ACISP.
[8]
Robin Milner,et al.
On Observing Nondeterminism and Concurrency
,
1980,
ICALP.
[9]
Alfredo De Santis,et al.
Design of Self-Healing Key Distribution Schemes
,
2004,
Des. Codes Cryptogr..
[10]
Thomas M. Cover,et al.
Elements of Information Theory
,
2005
.
[11]
Ernest F. Brickell,et al.
Some Ideal Secret Sharing Schemes
,
1990,
EUROCRYPT.
[12]
Information Security and Privacy
,
1996,
Lecture Notes in Computer Science.