DocumentCode :
2290912
Title :
Generalized secret sharing and group-key distribution using short keys
Author :
Mayer, Alain ; Yung, Moti
Author_Institution :
Bell Labs., Lucent Technol., USA
fYear :
1997
fDate :
11-13 Jun 1997
Firstpage :
30
Lastpage :
44
Abstract :
We relate two basic primitives: generalized secret sharing and group-key distribution. We suggest cryptographic implementations for both and show that they are provably secure according to exact definitions and assumptions given in the present paper. Both solutions require small secret space (namely, short keys). We first consider secret sharing with arbitrary access structures which is a basic primitive for controlling retrieval of secret information. We consider the computational security model, where cryptographic assumptions are allowed. Our design of a general secret-sharing scheme requires considerably less secure memory (i.e., shorter keys) than before. We then introduce the notion of a (single source) group-key distribution protocol which allows a center in an integrated network to securely and repeatedly send different keys to different groups. Such a capability is of increasing importance as it is a building block for secret information dissemination to various groups of participants in the presence of eavesdropping in a network environment. There are only a few previous investigations concerning this primitive and they either require a large amount of storage of secret information (due to their information theoretic security model) or lack rigorous definitions and proofs of security. We base both primitives on pseudo-random functions. We prove that the two are related; we give a reduction showing that group-key distribution implies secret-sharing under pseudo-random functions (i.e., one-way functions)
Keywords :
computer networks; cryptography; open systems; protocols; arbitrary access structures; basic primitives; computational security; cryptographic implementations; eavesdropping; generalized secret sharing; group-key distribution; information theoretic security model; integrated network; memory; network environment; one-way functions; pseudo-random functions; retrieval; secret information; secret information dissemination; secret space; short keys; Computational modeling; Cryptography; Information retrieval; Information security; Secure storage; Telecommunication traffic; Teleconferencing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Compression and Complexity of Sequences 1997. Proceedings
Conference_Location :
Salerno
Print_ISBN :
0-8186-8132-2
Type :
conf
DOI :
10.1109/SEQUEN.1997.666901
Filename :
666901
Link To Document :
بازگشت