A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
Year 2019,
Volume: 7 Issue: 1, 861 - 871, 31.01.2019
Hüseyin Bodur
,
Resul Kara
Abstract
In a broadcast communication method,the schemes in which encryption methods are used are often used to
transmit messages from a source to multiple users. These schemes are divided into central and de-central in
terms of key server operations. In this work, two central methods which are widely used nowadays are
mentioned: Logical Key Hierarchy (LKH) and One Way Function Tree (OFT) schemes. A scheme for broadcast
communication is proposed and compared with the existing schemes in terms of numbers-sizes of key
transmissions in user joining/removing and numbers-sizes of keys in the user.
References
- [1] Shanu PK. ve Chandrasekaran K., "Distribution function based efficient secure group communication using key tree," Recent Trends in Information Technology (ICRTIT), ss. 1-6, 2016.
- [2] Prathap M. Joe ve Vasudevan V., "Analysis of the various key management algorithms and new proposal in the secure multicast communications," arXiv preprint arXiv:0906.3956, 2009.
- [3] Sakamoto T., Tsuji T. ve Kaji Y., "Group key rekeying using the LKH technique and the huffman algorithm," Information Theory and Its Applications (ISITA), ss. 1-6, 2008.
- [4] Gu Q., Peng L. ve Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services," IEEE Transactions on Dependable and Secure Computing, 6.3, ss. 188-201, 2009.
- [5] Song W., Zou H., Liu H. ve Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group," China Communications, 13.6, ss. 205-216, 2016.
- [6] Alyani N., Seman K., Nawawi NM. ve Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm," J.
Emerging Trends in Computing and Information Sciences, 3.3, 2012.
- [7] Liu H., Li J., Hao X. ve Zou G., "A novel LKH key tree structure based on heuristic search algorithm," Communication Problem-Solving (ICCP), ss. 35-38, 2014.
- [8] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications,"In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) ss. 1-7, 2014.
- [9] Bodur H. ve Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission," Computational Intelligence and Communication Networks (CICN), ss. 144-147, 2017.
- [10] Sun Y., Chen M., Bacchus A. ve Lin X., "Towards collusion-attack-resilient group key management using one-way function tree," Computer Networks, 104, ss. 16-26, 2016.
- [11] Xu X., Wang L., Youssef A. ve Zhu B., "Preventing collusion attacks on the one-way function tree (OFT) scheme," Applied Cryptography and Network Security, ss. 177-193, 2007.
- [12] Hwang MS. ve Sung PC., "A study of micro-payment based on one-way hash chain," IJ Network Security, 2.2, ss. 81-90, 2006.
- [13] Wong CK., Gouda M. ve Lam SS., "Secure group communications using key graphs," IEEE/ACM transactions on networking, 8.1, 28, ss. 16-30, 1998.
- [14] Balenson D., McGrew D. ve Sherman A., "Key management for large dynamic groups: Oneway function trees and amortized initialization," 1999.
- [15] Sherman AT. ve McGrew DA., "Key establishment in large dynamic groups using one-way function trees," IEEE transactions on Software Engineering, 29.5, ss. 444-458, 2003.
Yayın Şifreleme Şemaları Üzerinde Bir Karşılaştırma: Bir Yeni Yayın Şifreleme Şeması
Year 2019,
Volume: 7 Issue: 1, 861 - 871, 31.01.2019
Hüseyin Bodur
,
Resul Kara
Abstract
Bir yayın haberleşme yönteminde bir kaynaktan çoklu kullanıcılara mesaj iletimi için genellikle içerisinde
şifreleme yöntemlerinin kullanıldığı şemalardan yararlanılır. Bu şema yapıları anahtar sunucu işlemleri açısından
merkezi ve de-merkezi olmak üzere ikiye ayrılır. Bu çalışmada günümüzde yaygın olarak kullanılan iki merkezi
yöntem olan Mantıksal Anahtar Hiyerarşisi (MAH) ve Tek Yönlü Fonksiyon Ağacı (TFA) şemalarına
değinilmiştir. Yayın haberleşme için bir şema önerilmiş ve kullanıcı ekleme/çıkarma işlemlerinde anahtar iletim
sayıları-boyutları ve kullanıcılarda bulunan anahtar sayıları-boyutları açılarından mevcut şemalar ile
karşılaştırılmıştır.
References
- [1] Shanu PK. ve Chandrasekaran K., "Distribution function based efficient secure group communication using key tree," Recent Trends in Information Technology (ICRTIT), ss. 1-6, 2016.
- [2] Prathap M. Joe ve Vasudevan V., "Analysis of the various key management algorithms and new proposal in the secure multicast communications," arXiv preprint arXiv:0906.3956, 2009.
- [3] Sakamoto T., Tsuji T. ve Kaji Y., "Group key rekeying using the LKH technique and the huffman algorithm," Information Theory and Its Applications (ISITA), ss. 1-6, 2008.
- [4] Gu Q., Peng L. ve Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services," IEEE Transactions on Dependable and Secure Computing, 6.3, ss. 188-201, 2009.
- [5] Song W., Zou H., Liu H. ve Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group," China Communications, 13.6, ss. 205-216, 2016.
- [6] Alyani N., Seman K., Nawawi NM. ve Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm," J.
Emerging Trends in Computing and Information Sciences, 3.3, 2012.
- [7] Liu H., Li J., Hao X. ve Zou G., "A novel LKH key tree structure based on heuristic search algorithm," Communication Problem-Solving (ICCP), ss. 35-38, 2014.
- [8] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications,"In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) ss. 1-7, 2014.
- [9] Bodur H. ve Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission," Computational Intelligence and Communication Networks (CICN), ss. 144-147, 2017.
- [10] Sun Y., Chen M., Bacchus A. ve Lin X., "Towards collusion-attack-resilient group key management using one-way function tree," Computer Networks, 104, ss. 16-26, 2016.
- [11] Xu X., Wang L., Youssef A. ve Zhu B., "Preventing collusion attacks on the one-way function tree (OFT) scheme," Applied Cryptography and Network Security, ss. 177-193, 2007.
- [12] Hwang MS. ve Sung PC., "A study of micro-payment based on one-way hash chain," IJ Network Security, 2.2, ss. 81-90, 2006.
- [13] Wong CK., Gouda M. ve Lam SS., "Secure group communications using key graphs," IEEE/ACM transactions on networking, 8.1, 28, ss. 16-30, 1998.
- [14] Balenson D., McGrew D. ve Sherman A., "Key management for large dynamic groups: Oneway function trees and amortized initialization," 1999.
- [15] Sherman AT. ve McGrew DA., "Key establishment in large dynamic groups using one-way function trees," IEEE transactions on Software Engineering, 29.5, ss. 444-458, 2003.