TY - JOUR
T1 - Bounds and constructions for key distribution schemes
AU - Desmedt, Y.
AU - Duif, N.
AU - Tilborg, van, H.C.A.
AU - Wang, Huaxiong
PY - 2009
Y1 - 2009
N2 - Key distribution schemes play a significant role in key assignment schemes which allow participants in a network to communicate by means of symmetric cryptography in a secure way without the need of a unique key for every pair of participants. It is assumed that an adversary can eavesdrop on all communication and can corrupt up to vertices in the network. It follows that, in general, the sender needs to transmit at least shares of the message over different paths to the intended receiver and that each participant needs to possess at least encryption keys. We do assume that vertices in the network will forward messages correctly (but only the corrupted vertices will collude with the adversary to retrieve the message).
We focus on two approaches. In the first approach, the goal is to minimize the number of keys per participant. An almost complete answer is presented. The second approach is to minimize the total number of keys that are needed in the network. The number of communication paths that are needed to guarantee secure communication becomes a relevant parameter. Our security relies on the random oracle model.
AB - Key distribution schemes play a significant role in key assignment schemes which allow participants in a network to communicate by means of symmetric cryptography in a secure way without the need of a unique key for every pair of participants. It is assumed that an adversary can eavesdrop on all communication and can corrupt up to vertices in the network. It follows that, in general, the sender needs to transmit at least shares of the message over different paths to the intended receiver and that each participant needs to possess at least encryption keys. We do assume that vertices in the network will forward messages correctly (but only the corrupted vertices will collude with the adversary to retrieve the message).
We focus on two approaches. In the first approach, the goal is to minimize the number of keys per participant. An almost complete answer is presented. The second approach is to minimize the total number of keys that are needed in the network. The number of communication paths that are needed to guarantee secure communication becomes a relevant parameter. Our security relies on the random oracle model.
U2 - 10.3934/amc.2009.3.273
DO - 10.3934/amc.2009.3.273
M3 - Article
SN - 1930-5346
VL - 3
SP - 273
EP - 293
JO - Advances in Mathematics of Communications
JF - Advances in Mathematics of Communications
IS - 3
ER -