DocumentCode
2290912
Title
Generalized secret sharing and group-key distribution using short keys
Author
Mayer, Alain ; Yung, Moti
Author_Institution
Bell Labs., Lucent Technol., USA
fYear
1997
fDate
11-13 Jun 1997
Firstpage
30
Lastpage
44
Abstract
We relate two basic primitives: generalized secret sharing and group-key distribution. We suggest cryptographic implementations for both and show that they are provably secure according to exact definitions and assumptions given in the present paper. Both solutions require small secret space (namely, short keys). We first consider secret sharing with arbitrary access structures which is a basic primitive for controlling retrieval of secret information. We consider the computational security model, where cryptographic assumptions are allowed. Our design of a general secret-sharing scheme requires considerably less secure memory (i.e., shorter keys) than before. We then introduce the notion of a (single source) group-key distribution protocol which allows a center in an integrated network to securely and repeatedly send different keys to different groups. Such a capability is of increasing importance as it is a building block for secret information dissemination to various groups of participants in the presence of eavesdropping in a network environment. There are only a few previous investigations concerning this primitive and they either require a large amount of storage of secret information (due to their information theoretic security model) or lack rigorous definitions and proofs of security. We base both primitives on pseudo-random functions. We prove that the two are related; we give a reduction showing that group-key distribution implies secret-sharing under pseudo-random functions (i.e., one-way functions)
Keywords
computer networks; cryptography; open systems; protocols; arbitrary access structures; basic primitives; computational security; cryptographic implementations; eavesdropping; generalized secret sharing; group-key distribution; information theoretic security model; integrated network; memory; network environment; one-way functions; pseudo-random functions; retrieval; secret information; secret information dissemination; secret space; short keys; Computational modeling; Cryptography; Information retrieval; Information security; Secure storage; Telecommunication traffic; Teleconferencing;
fLanguage
English
Publisher
ieee
Conference_Titel
Compression and Complexity of Sequences 1997. Proceedings
Conference_Location
Salerno
Print_ISBN
0-8186-8132-2
Type
conf
DOI
10.1109/SEQUEN.1997.666901
Filename
666901
Link To Document