On Group Key Management for Secure Multicast Employing the Inverse Element

Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse ele...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU, Wen Tao, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/484
http://dx.doi.org/10.1109/MINES.2009.56
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1483
record_format dspace
spelling sg-smu-ink.sis_research-14832010-09-24T06:36:22Z On Group Key Management for Secure Multicast Employing the Inverse Element ZHU, Wen Tao DENG, Robert H. Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would otherwise have to be delivered online so as to be distributed to the residual members. In this work, both performance and security of the scheme are investigated. We first point out that the scheme does not really exhibit the preferred reduction in terms of overall communication overhead, as the cost is actually shifted from the leave scenario to the join one. Then we reveal a design flaw regarding the generation of the inverse element, due to which a departed member can actually continue decrypting the multicast traffic intended only for others. Furthermore, we show that the scheme is a special yet incorrect implementation of the well studied Complementary Variable Approach, and thus suffers also from the well-known colluding attack. In addition, a similar problem is observed in another but more recent scheme by Sun et al., which is inherently vulnerable to collusion, too. 2009-11-18T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/484 info:doi/10.1109/MINES.2009.56 http://dx.doi.org/10.1109/MINES.2009.56 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
ZHU, Wen Tao
DENG, Robert H.
On Group Key Management for Secure Multicast Employing the Inverse Element
description Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would otherwise have to be delivered online so as to be distributed to the residual members. In this work, both performance and security of the scheme are investigated. We first point out that the scheme does not really exhibit the preferred reduction in terms of overall communication overhead, as the cost is actually shifted from the leave scenario to the join one. Then we reveal a design flaw regarding the generation of the inverse element, due to which a departed member can actually continue decrypting the multicast traffic intended only for others. Furthermore, we show that the scheme is a special yet incorrect implementation of the well studied Complementary Variable Approach, and thus suffers also from the well-known colluding attack. In addition, a similar problem is observed in another but more recent scheme by Sun et al., which is inherently vulnerable to collusion, too.
format text
author ZHU, Wen Tao
DENG, Robert H.
author_facet ZHU, Wen Tao
DENG, Robert H.
author_sort ZHU, Wen Tao
title On Group Key Management for Secure Multicast Employing the Inverse Element
title_short On Group Key Management for Secure Multicast Employing the Inverse Element
title_full On Group Key Management for Secure Multicast Employing the Inverse Element
title_fullStr On Group Key Management for Secure Multicast Employing the Inverse Element
title_full_unstemmed On Group Key Management for Secure Multicast Employing the Inverse Element
title_sort on group key management for secure multicast employing the inverse element
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/484
http://dx.doi.org/10.1109/MINES.2009.56
_version_ 1770570451527925760