A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.author | Das, S. | |
dc.contributor.editor | Ramesh Jain | |
dc.contributor.editor | Mohan Kumar | |
dc.date.accessioned | 2017-01-30T14:02:33Z | |
dc.date.available | 2017-01-30T14:02:33Z | |
dc.date.created | 2009-02-05T18:01:49Z | |
dc.date.issued | 2008 | |
dc.identifier.citation | Tian, Biming and Han, Song and Dillon, Tharam S. and Das, Sajal. 2008. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains, in Jain, R. and Kumar, M. (ed), 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshop on Security, Privacy and Authentication in Wireless Networks, Jun 23 2008, pp. 1-6. California, USA: Institute of Electrical and Electronics Engineers (IEEE). | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/37405 | |
dc.identifier.doi | 10.1109/WOWMOM.2008.4594921 | |
dc.description.abstract |
An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function techniques. Vector space secret sharing helps to realize general monotone decreasing structures for the family of subsets of users that can be revoked instead of a threshold one. One way hash chains contribute to reduce communication overhead. Furthermore, the most prominent characteristic of our scheme is resisting collusion between the new joined users and the revoked users, which is fatal weakness of hash function based self-healing key distribution schemes. | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.title | A self-healing key distribution scheme based on vector space secret sharing and one way hash chains | |
dc.type | Conference Paper | |
dcterms.source.startPage | 1 | |
dcterms.source.endPage | 6 | |
dcterms.source.title | Proceedings of the 9th IEEE international symposium on a world of wireless, mobile and multimedia networks workshop on security, privacy and authentication in wireless networks (IEEE WOWMOM SPAWN 2008) | |
dcterms.source.series | Proceedings of the 9th IEEE international symposium on a world of wireless, mobile and multimedia networks workshop on security, privacy and authentication in wireless networks (IEEE WOWMOM SPAWN 2008) | |
dcterms.source.isbn | 9781424420995 | |
dcterms.source.conference | 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshop on Security, Privacy and Authentication in Wireless Networks (IEEE WOWMOM SPAWN 2008) | |
dcterms.source.conference-start-date | 23 Jun 2008 | |
dcterms.source.conferencelocation | California, USA | |
dcterms.source.place | USA | |
curtin.note |
Copyright © 2008 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Economics and Finance |