More on Master Keys for Group

نویسندگان

  • Dorothy E. DENNING
  • Henk MEIJER
چکیده

Two schemes for key distribution in a computer network are presented in [ 11. Given a network of N users, these schemes allow the construction of group keys and master keys for each of the 2N N 1 subgroups of two or more users from only O(N) pieces of secret information. Agrroup key allows the members of a group to communicate among themselves; a master kq allows the holder to compute group keys for all subgroups of the group for which it is the master. In this paper we show that the first of the two schemes presented in [ 11 can be compromised. We present a so!ution to this problem, and then show that our solution leads to a general strategy for constructing schemes that support group keys and master keys.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Master Keys for Group Sharing

7”he first two requirements state that messages enciphered (deciphered) with any key in the sei S must be decipherable (enci;pherable) with the master .key MK. The third requirement states that the space requirements for MK must ,be substantially less than that of all keys in S; otherwise, MK could be implemented simply as a list of the keys in S. MK, therefore, provides a compact representatio...

متن کامل

Tracing Insider Attacks in the Context of Predicate Encryption Schemes

In a predicate encryption scheme an authority generates master public and secret keys, and uses the master secret key to derive personal secret keys for authorized users. Each user’s personal secret key SKf corresponds to a predicate f defining the access rights of that user, and each ciphertext is associated (by the sender) with an attribute. The security provided is that a ciphertext associat...

متن کامل

Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesti...

متن کامل

Hierarchical deterministic Bitcoin wallets that tolerate key leakage ( Short paper )

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesti...

متن کامل

A Modular Security Analysis of the TLS Handshake Protocol

We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity present in the design of the protocol: the application keys offered to higher level applications are obtained from a master key, which in turn is derived, through interaction, from a pre-master key. Our first con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1981