Abstract
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key is updated, in a tree-based method, it suffices to send the update to a small subset of the group, instead of entire group, as current methods require. Our scheme distributes each updated public key to a relatively small subgroup, called its trust set, greatly improving performance. Moreover, we use a threshold secret sharing method to distribute the function of the trusted authority across trust sets, thereby guaranteeing key authentication, enhancing fault-tolerance, and protecting our protocol from impersonation attacks. Our performance analysis suggests that our scheme significantly reduces the communication overhead and storage requirement.
Chapter PDF
Similar content being viewed by others
References
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the CCS’00. (2000)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE TRANSACTIONS on Parallel and Distributed Systems 11 (2000)
Perrig, A.: Efficient collabortive key management protocols for secure au-tomonomous group communication. In: Proceedings of CrypTEC’99. (1999)
Wong, C, Gouda, M., Lam, S.: Secure group communication using key graphs. In: Proceedings of the ACM SIGCOMM’98, Vancouver, Canada (1998)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architecture. In: Internet Draft, draft-wallner-key-arch-01.txt. (1998)
Steiner, M., Tsudik, G., Waidner, M.: Cliques: A new approach to group key agreement. In: Proceedings of the ICDCS’98, Amsterdam, Netherlands (1998)
Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal of Selected Areas in Communications 18 (2000)
Pereira, O., Quisquater, J.: A security analysis of the cliques protocols suites. In: Proceedings of the 14-th IEEE Computer Security Foundations Workshop. (2001)
Lee, P., Lui, J., Yau, D.: Distributed collaborative key agreement protcols for dynamic peer groups. In: Proceedings of the ICNP’02. (2002)
Lee, P., Lui, J., Yau, D.: Distributed collaborative key agreement protcols for dynamic peer groups. Technical report, Dept. of Computer Science and Engineering, Chinese University of Hong Kong (2002)
Kong, J., Zerfos, P., Luo, H., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the ICNP’01. (2001)
Zhou, L., C.V. Ravishankar: Efficient, authenticated, and fault-tolerant key agreement for dynamic peer groups. Technical Report 88, Dept. of Computer Science and Engineering, University of California, Riverside (2003)
Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in p2p and manets: the case of membership control. In: Proceeding of the ICNP’03. (2003)
Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the performance of group key agreement protocols. In: Proceedings of the ICDCS’02. (2002)
Amir, Y., Nita-Rotaru, C., Stanton, J., Tsudik, G.: Scaling secure group communication systems: Beyong peer-to-peer. In: Proceedings of the DISCEX’03, Washington DC (2003)
Shamir, A.: How to share a secret. Communications of the ACM 22 (1979)
M.G. Gouda, Huang, C., E.N. Elnozahy: Key trees and the security of interval multicast. In: Proceedings of the ICDCS’02, Vienna, Austria (2002)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage, extened abstract, IBM T.J. (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, L., Ravishankar, C.V. (2004). Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups. In: Mitrou, N., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds) Networking 2004. NETWORKING 2004. Lecture Notes in Computer Science, vol 3042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24693-0_62
Download citation
DOI: https://doi.org/10.1007/978-3-540-24693-0_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21959-0
Online ISBN: 978-3-540-24693-0
eBook Packages: Springer Book Archive