Skip to main content

Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

Abstract

In a dynamic group key distribution scheme, members of a group themselves generate private common keys with the help of a group controller in an initialization phase. The system must enable the revocation and the addition of members to the group in the successive periods of time. If the addition of new members can also be performed by the existing members themselves, then the scheme is said to have decentralized user join.

In this work we construct a general family of dynamic group key distribution schemes with decentralized user join by using linear secret sharing schemes as a tool. This allows to obtain new schemes with more flexible characteristics than the previous threshold-based constructions.

This work was partially supported by Spanish Ministerio de Ciencia y Tecnología under project TIC 2000-1044.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Anzai, N. Matsuzaki and T. Matsumoto. A quick group key distribution scheme with “Entity Revocation”. Advances in Cryptology-Asiacrypt’99, LNCS 1716, Springer-Verlag, pp. 333–347 (1999).

    Google Scholar 

  2. S. Berkovits. How to broadcast a secret. Advances in Cryptology-Eurocrypt’91, LNCS 547, Springer-Verlag, pp. 536–541 (1991).

    Google Scholar 

  3. E.F. Brickell. Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing, 9, pp. 105–113 (1989).

    MathSciNet  Google Scholar 

  4. R. Canetti, T. Malkin and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. Advances in Cryptology-Eurocrypt’99, LNCS 1592, Springer-Verlag, pp. 469–479 (1998).

    Google Scholar 

  5. G. Caronni, B. Plattner, D. Sun, M. Wandvogel and N. Weiler. The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), (1999).

    Google Scholar 

  6. P. Feldman. A practical scheme for non-interactive verifiable secret sharing. Proceedings of FOCS’87, IEEE Press, pp. 427–437 (1987).

    Google Scholar 

  7. P.A. Fouque and J. Stern. One round threshold discrete-log key generation without private channels. Proceedings of PKC’01, LNCS 1992, Springer-Verlag, pp. 190–206 (2001).

    Google Scholar 

  8. R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. Advances in Cryptology-Eurocrypt’99, LNCS 1592, Springer-Verlag, pp. 295–310 (1999).

    Google Scholar 

  9. L. Gong. New protocols for third party based authentication and secure broadcast. Proceedings of 2nd ACM Conference CCS, pp. 176–183 (1994).

    Google Scholar 

  10. M. Just, E. Kranakis, D. Krizanc and P. van Oorschot. On key distribution via true broadcasting. Proceedings of 2nd ACM Conference CCS, pp. 81–88 (1994).

    Google Scholar 

  11. H. Kurnio, L. McAven, R. Safavi-Naini and H. Wang. A dynamic group key distribution scheme with flexible user join. Proceedings of ICISC’02, LNCS 2587, Springer-Verlag, pp. 478–496 (2002).

    Google Scholar 

  12. H. Kurnio, R. Safavi-Naini and H. Wang. A group key distribution scheme with decentralised user join. Proceedings of SCN’02, LNCS 2576, Springer-Verlag, pp. 146–163 (2002).

    Google Scholar 

  13. D.A. McGrew and A.T. Sherman. Key establishment in large dynamic groups using one-way function trees. Manuscript (1998).

    Google Scholar 

  14. A. Mayer and M. Yung. Generalized secret sharing and group-key distribution using short keys. Proceedings of IEEE Conference on Compression and Complexity of Sequences, pp. 30–44 (1997).

    Google Scholar 

  15. M. Naor, B. Pinkas. Efficient trace and revoked schemes. Proceedings of Financial Cryptography’00, LNCS 1962, Springer-Verlag, pp. 1–20 (2000).

    Chapter  Google Scholar 

  16. C. Padró and G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Transactions on Information Theory, 46(7), pp. 2596–2604 (2000).

    Article  MATH  Google Scholar 

  17. B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its applications to electronic voting. Advances in Cryptology-Crypto’99, LNCS 1666, Springer-Verlag, pp. 148–164 (1999).

    Google Scholar 

  18. A. Shamir. How to share a secret. Communications of the ACM, 22, pp. 612–613 (1979).

    Article  MATH  MathSciNet  Google Scholar 

  19. G.J. Simmons, W. Jackson and K. Martin. The geometry of secret sharing schemes. Bulletin of the ICA 1, pp. 71–88 (1991).

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Daza, V., Herranz, J., Sáez, G. (2003). Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_40

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_40

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics