DocumentCode :
3659726
Title :
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
Author :
Purushothama B R;Nishat Koti
Author_Institution :
Computer Science and Engineering, National Institute of Technology Goa, Farmagudi, Ponda, 403401, INDIA
fYear :
2015
Firstpage :
1825
Lastpage :
1829
Abstract :
Key management schemes for secure group communications should satisfy two basic security requirements, backward secrecy and forward secrecy. Most of the prominent secure group key management schemes are shown to satisfy the basic security requirements considering passive attack model. In this paper, we analyze secure group key management schemes under active outsider attack model. In active outsider attack model, an adversary can compromise a legitimate user of the group. We show that some of the efficient tree based, non-tree based and proxy re-encryption based group key management schemes are not secure under active attack model. We evaluate the cost involved in making these schemes secure under active attack model. Also, we construct a secure version of these schemes and show that the schemes are secure under active outsider attack model.
Keywords :
"Cryptography","Polynomials","Vegetation","Analytical models","Computational modeling","Servers"
Publisher :
ieee
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on
Print_ISBN :
978-1-4799-8790-0
Type :
conf
DOI :
10.1109/ICACCI.2015.7275882
Filename :
7275882
Link To Document :
بازگشت