A NEW GROUP KEY GENERATING MODEL FOR GROUP SHARING

被引:2
作者
CHIU, KH [1 ]
CHEN, WT [1 ]
机构
[1] NATL TSING HUA UNIV,DEPT COMP SCI,HINCHU 30043,TAIWAN
关键词
D O I
10.1016/0020-0255(92)90112-L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in those secure applications that have the one-to-many property, such as broadcasting secret messages from one source to many users on a network, accessing a sharable secure file by a subgroup of users in a data management system, etc. For these secure applications, Denning and Schneider [4] have proposed two methods to derive all of the group keys, one for each nonempty possible group. These methods require the cipher to be able to withstand the chosen-plaintext attack. In this paper, we propose a model to generalize their methods. Any cipher that is used on our proposed model to generate all of the group keys is only expected to be secure against the known-plaintext attack. Therefore, on the basis of our proposed model, we can have a more efficient method to generate the group keys.
引用
收藏
页码:83 / 94
页数:12
相关论文
共 13 条
[1]   MASTER KEYS FOR GROUP SHARING [J].
BROUWER, AE ;
BOAS, PV .
INFORMATION PROCESSING LETTERS, 1982, 14 (01) :12-14
[2]   SECURE BROADCASTING USING THE SECURE LOCK [J].
CHIOU, GH ;
CHEN, WT .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (08) :929-930
[3]  
Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
[4]   MASTER KEYS FOR GROUP SHARING [J].
DENNING, DE ;
SCHNEIDER, FB .
INFORMATION PROCESSING LETTERS, 1981, 12 (01) :23-25
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   POINT-TO-MULTIPOINT COMMUNICATION OVER BROADCAST LINKS [J].
GOPAL, IS ;
JAFFE, JM .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (09) :1034-1044
[7]   SECURITY REQUIREMENTS AND PROTOCOLS FOR A BROADCAST SCENARIO [J].
KENT, ST .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :778-786
[8]  
LIN S, 1982, ERROR ONTROL CODING
[9]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[10]  
Niven I., 1972, INTRO THEORY NUMBERS