Skip to main content
Log in

Lightweight and flexible key distribution schemes for secure group communications

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Key distribution is one of the most fundamental cryptographic primitives that can establish secure group communications in both centralized and distributed networks. A one-time session key is needed to be shared among all users to protect the exchanged messages. In traditional one-to-one communication, a one-time key is shared between two users. But in modern many-to-many communication, a group key is shared among multiple users. Lightweight group key distributions are especially attractive for wireless/mobile applications, since most mobile devices only have limited power in computation and communication. But most of the existing group key distributions need to execute complicate mathematical operations. In this paper, we first present a novel design of key distribution. The basic key distribution protocol requires only logic XOR operation. Then, we show the flexibility of our basic scheme by demonstrating its applications in various network models, including both centralized and distributed key distributions. All key distribution schemes proposed in this paper are lightweight since they only require logic XOR operations. Logic operation is the most efficient operation which is much faster than the other mathematical operations. Furthermore, all our proposed schemes are non-interactive and they require the least amount of communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. IEEE 802 LAN/MAN Standards Committee. (2019). IEEE 802.11, The Working Group Setting the Standards for Wireless LANs. Retrieved 5.

  2. Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice (pp. 168–183, 191–192). Wiley.

  3. Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks: Technology, protocols, and applications (pp. 203–209). Hoboken: Wiley.

    Book  Google Scholar 

  4. Seferian, V., Kanj, R., Chehab, A., & Kayssi, A. (2018). Identity based key distribution framework for link layer security of AMI networks. IEEE Transactions on Smart Grid, 9(4), 3166–3179.

    Article  Google Scholar 

  5. Li, X., Wang, Y., Vijayakumar, P., He, D., Kumar, N., & Ma, J. (2019). Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Transactions on Vehicular Technology, 68(11), 11309–11322.

    Article  Google Scholar 

  6. Kurt, G. K., Ozdemir, E., Ozkirisci, N. A., & Topal, O. A. (2019). A key verification protocol for quantum key distribution. IEEE Access, 7, 141386–141394.

    Article  Google Scholar 

  7. Clifford, N., Sam, H., Tom, Y., & Kenneth, R. (2016). The Kerberos network authentication service (V5). Archived from the original on August 21, 2016.

  8. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  9. Jarecki, S., Kim, J., & Tsudik, G. (2011). Flexible robust group key agreement. IEEE Transactions on Parallel and Distributed Systems, 22(5), 879–886.

    Article  Google Scholar 

  10. Harn, L., & Lin, C. (2014). Efficient group Diffie–Hellman key agreement protocols. Computers and Electrical Engineering, 40, 1972–1980.

    Article  Google Scholar 

  11. Joux, A. (2004). A one round protocol for tripartite Diffie–Hellman. In Algorithmic number theory: 4th international symposium, ANTS-IV. Lecture Notes in Computer Science, Vol. 1838 (2000), pp. 385–393. Full version: Journal of Cryptology, 17, 263–276.

  12. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (2004). Perfectly-secure key distribution for dynamic conferences. In Advances in cryptologyCrypto’92, 1993 (Vol. 740, pp. 471–486). Springer.

  13. Laih, C. S., Lee, J. Y., & Harn, L. (1989). A new threshold scheme and its application in designing the conference key distribution cryptosystem. Information Processing Letters, 32, 95–99.

    Article  MathSciNet  Google Scholar 

  14. Harn, L., & Lin, C. (2010). Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers, 59(6), 842–846.

    Article  MathSciNet  Google Scholar 

  15. Jiao, R., Ouyang, H., Lin, Y., Luo, Y., Li, G., Jiang, Z., et al. (2019). A computation-efficient group key distribution protocol based on an secret sharing scheme. Information, 10, 175. https://doi.org/10.3390/info10050175.

    Article  Google Scholar 

  16. Kaliski, B. RFC 2898-PKCS #5: password-based cryptography specification. RSA Laboratories, Version 2.0.

  17. Barnes, R., Thomson, M., Pironti, A., & Langley, A. (2015). Deprecating secure sockets layer version 3.0. Archived from the original on March 28, 2018.

  18. Garfinkel, S. (1995). PGP: Pretty Good Privacy. O’Reilly and Associates. ISBN 1-56592-098-8.

  19. X.509: Information technology—Open Systems Interconnection—The Directory: Public-key and attribute certificate frameworks. www.itu.int. Retrieved November 06, 2019.

  20. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of ACM CCS, 2002 (pp. 41–47).

  21. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (SP), May 2003 (pp. 197–213).

Download references

Acknowledgements

Lein Harn and Chingfang Hsu contributed equally to this work. This work was partially supported by the National Natural Science Foundation of China (Grants No. 61772224) and Natural Science Foundation of Hubei Province (Grant No. 2017CFB303).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chingfang Hsu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Harn, L., Hsu, C. & Xia, Z. Lightweight and flexible key distribution schemes for secure group communications. Wireless Netw 27, 129–136 (2021). https://doi.org/10.1007/s11276-020-02449-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02449-2

Keywords

Navigation