会议专题

On Group Key Management for Secure Multicast Employing the Inverse Element

Recently, Pour et al. 1 proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would otherwise have to be delivered online so as to be distributed to the residual members. In this work, both performance and security of the scheme are investigated. We first point out that the scheme does not really exhibit the preferred reduction in terms of overall communication overhead, as the cost is actually shifted from the leave scenario to the join one. Then we reveal a design flaw regarding the generation of the inverse element, due to which a departed member can actually continue decrypting the multicast traffic intended only for others. Furthermore, we show that the scheme is a special yet incorrect implementation of the well studied Complementary Variable Approach, and thus suffers also from the well-known colluding attack. In addition, a similar problem is observed in another but more recent scheme by Sun et al. 6, which is inherently vulnerable to collusion, too.

Wen Tao Zhu Robert H. Deng

State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences P. O School of Information Systems Singapore Management University 80 Stamford Road, Singapore 178902

国际会议

The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)

武汉

英文

337-341

2009-11-18(万方平台首次上网日期,不代表论文的发表时间)