Dynamic Authenticated Secure Group Communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Dynamic Authenticated Secure Group Communication

Authors: R. Aparna, B. B. Amberker

Abstract:

Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issue in Secure Group communication. We develop a protocol for Secure Authentic Communication where we address authentication for the group communication scheme proposed by Blundo et al. which only provides confidentiality. Authentication scheme used is a multiparty authentication scheme which allows all the users in the system to send and receive messages simultaneously. Our scheme is secure against colluding malicious parties numbering fewer than k.

Keywords: Secure Group Communication, Secret key, Authentication, Authentication code, Threshold.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1335184

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1315

References:


[1] R. Aparna, B.B. Amberker, Prashant Koulgi. Multi-sender Multireceiver Message Authentication and an Application to Verifiable Secret Sharing. National conference on Mathematical Foundations of Coding, Complexity, Computation and Cryptography, IISc., Bangalore , June 2006.
[2] Blom, R.: An Optimal Class of Symmetric Key Generation Systems, in Advances in Cryptology-Eurocrypt -84, LNCS, 209 (1985), 335-338.
[3] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. Perfectly Secure Key Distribution for Dynamic Conferences, in Advances in Cryptology-CRYPTO-92.
[4] M. Burmester. and Y. Desmedt, A Secure and Efficient Conference Key Distribution System, Advances in Cryptology - EUROCRYPT-94.
[5] Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver/Multi-sender Network Security: Efficient Authenticated Multicast/Feedback, IEEE Infocom -92, pp.2045-2054, (1992).
[6] W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, Nov 1976.
[7] A. Fiat and M. Naor, Broadcast Encryption. In D.R.Stinson, editor, Proceedings of CRYPTO-93, pp 480-491.
[8] A.T. Sherman and D.A. McGrew. Key Establishment in Large Dynamic groups using One-way Function trees. IEEE Transactions on Software Engg. 2003, pp 444-458.
[9] M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman key distribution extended to group communication. In SIGSAC proceedings of the third ACM conference on Computer and Communications Security. New Delhi, India, March 1996., ACM, New York, pp.31-37.
[10] D. Wallner, E. Harder and R.Agee. Key Management for Multicast: Issues and Architectures. Request for Comments (Informational) 2627, Internet Engineering Task Force, June 1999.
[11] C. Wong, M. Gouda, and S. Lam. Secure Group Communication Using key Graphs. In proceedings of the ACM SIGCOMM-98, Oct. 1998.
[12] C.K.Wong., Simon S. Lam., Keystone: A Group key management service, In proceedings of International conference on Telecommunications, Acapulco, Mexico, May 2000.
[13] Safavi-Naini, R., Wang, H.: New Results on Multi-receiver Authentication codes, In Advances in Cryptology-Eurocrypt -98, LNCS, 1438 (1998), 527-541.
[14] Safavi-Naini, R., Wang, H.: Multi-receiver authentication codes: Models, Bounds, Constructions and Extensions, Information and Computation, 151, pp.148-172, (1999).
[15] Safavi-Naini, R., Wang, H.: Broadcast Authentication for Group Communication, Theoretical Computer Science, 269 (1-2), pp.1-21, (2001).
[16] Simmons, G.J.: A Survey of Information Authentication, in Contemporary Cryptology, The Science of Information Integrity, G.J.Simmons, ed., IEEE Press, 1992, 379-419.