Show simple item record

dc.contributor.authorTian, Biming
dc.contributor.authorHan, Song
dc.contributor.authorDillon, Tharam S.
dc.contributor.authorDas, S.
dc.contributor.editorRamesh Jain
dc.contributor.editorMohan Kumar
dc.date.accessioned2017-01-30T14:02:33Z
dc.date.available2017-01-30T14:02:33Z
dc.date.created2009-02-05T18:01:49Z
dc.date.issued2008
dc.identifier.citationTian, Biming and Han, Song and Dillon, Tharam S. and Das, Sajal. 2008. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains, in Jain, R. and Kumar, M. (ed), 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshop on Security, Privacy and Authentication in Wireless Networks, Jun 23 2008, pp. 1-6. California, USA: Institute of Electrical and Electronics Engineers (IEEE).
dc.identifier.urihttp://hdl.handle.net/20.500.11937/37405
dc.identifier.doi10.1109/WOWMOM.2008.4594921
dc.description.abstract

An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function techniques. Vector space secret sharing helps to realize general monotone decreasing structures for the family of subsets of users that can be revoked instead of a threshold one. One way hash chains contribute to reduce communication overhead. Furthermore, the most prominent characteristic of our scheme is resisting collusion between the new joined users and the revoked users, which is fatal weakness of hash function based self-healing key distribution schemes.

dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.titleA self-healing key distribution scheme based on vector space secret sharing and one way hash chains
dc.typeConference Paper
dcterms.source.startPage1
dcterms.source.endPage6
dcterms.source.titleProceedings of the 9th IEEE international symposium on a world of wireless, mobile and multimedia networks workshop on security, privacy and authentication in wireless networks (IEEE WOWMOM SPAWN 2008)
dcterms.source.seriesProceedings of the 9th IEEE international symposium on a world of wireless, mobile and multimedia networks workshop on security, privacy and authentication in wireless networks (IEEE WOWMOM SPAWN 2008)
dcterms.source.isbn9781424420995
dcterms.source.conference9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshop on Security, Privacy and Authentication in Wireless Networks (IEEE WOWMOM SPAWN 2008)
dcterms.source.conference-start-date23 Jun 2008
dcterms.source.conferencelocationCalifornia, USA
dcterms.source.placeUSA
curtin.note

Copyright © 2008 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Economics and Finance


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record