Abstract
Key distribution is one of the most fundamental cryptographic primitives that can establish secure group communications in both centralized and distributed networks. A one-time session key is needed to be shared among all users to protect the exchanged messages. In traditional one-to-one communication, a one-time key is shared between two users. But in modern many-to-many communication, a group key is shared among multiple users. Lightweight group key distributions are especially attractive for wireless/mobile applications, since most mobile devices only have limited power in computation and communication. But most of the existing group key distributions need to execute complicate mathematical operations. In this paper, we first present a novel design of key distribution. The basic key distribution protocol requires only logic XOR operation. Then, we show the flexibility of our basic scheme by demonstrating its applications in various network models, including both centralized and distributed key distributions. All key distribution schemes proposed in this paper are lightweight since they only require logic XOR operations. Logic operation is the most efficient operation which is much faster than the other mathematical operations. Furthermore, all our proposed schemes are non-interactive and they require the least amount of communication.
Similar content being viewed by others
References
IEEE 802 LAN/MAN Standards Committee. (2019). IEEE 802.11, The Working Group Setting the Standards for Wireless LANs. Retrieved 5.
Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice (pp. 168–183, 191–192). Wiley.
Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks: Technology, protocols, and applications (pp. 203–209). Hoboken: Wiley.
Seferian, V., Kanj, R., Chehab, A., & Kayssi, A. (2018). Identity based key distribution framework for link layer security of AMI networks. IEEE Transactions on Smart Grid, 9(4), 3166–3179.
Li, X., Wang, Y., Vijayakumar, P., He, D., Kumar, N., & Ma, J. (2019). Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Transactions on Vehicular Technology, 68(11), 11309–11322.
Kurt, G. K., Ozdemir, E., Ozkirisci, N. A., & Topal, O. A. (2019). A key verification protocol for quantum key distribution. IEEE Access, 7, 141386–141394.
Clifford, N., Sam, H., Tom, Y., & Kenneth, R. (2016). The Kerberos network authentication service (V5). Archived from the original on August 21, 2016.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Jarecki, S., Kim, J., & Tsudik, G. (2011). Flexible robust group key agreement. IEEE Transactions on Parallel and Distributed Systems, 22(5), 879–886.
Harn, L., & Lin, C. (2014). Efficient group Diffie–Hellman key agreement protocols. Computers and Electrical Engineering, 40, 1972–1980.
Joux, A. (2004). A one round protocol for tripartite Diffie–Hellman. In Algorithmic number theory: 4th international symposium, ANTS-IV. Lecture Notes in Computer Science, Vol. 1838 (2000), pp. 385–393. Full version: Journal of Cryptology, 17, 263–276.
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (2004). Perfectly-secure key distribution for dynamic conferences. In Advances in cryptology—Crypto’92, 1993 (Vol. 740, pp. 471–486). Springer.
Laih, C. S., Lee, J. Y., & Harn, L. (1989). A new threshold scheme and its application in designing the conference key distribution cryptosystem. Information Processing Letters, 32, 95–99.
Harn, L., & Lin, C. (2010). Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers, 59(6), 842–846.
Jiao, R., Ouyang, H., Lin, Y., Luo, Y., Li, G., Jiang, Z., et al. (2019). A computation-efficient group key distribution protocol based on an secret sharing scheme. Information, 10, 175. https://doi.org/10.3390/info10050175.
Kaliski, B. RFC 2898-PKCS #5: password-based cryptography specification. RSA Laboratories, Version 2.0.
Barnes, R., Thomson, M., Pironti, A., & Langley, A. (2015). Deprecating secure sockets layer version 3.0. Archived from the original on March 28, 2018.
Garfinkel, S. (1995). PGP: Pretty Good Privacy. O’Reilly and Associates. ISBN 1-56592-098-8.
X.509: Information technology—Open Systems Interconnection—The Directory: Public-key and attribute certificate frameworks. www.itu.int. Retrieved November 06, 2019.
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of ACM CCS, 2002 (pp. 41–47).
Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (SP), May 2003 (pp. 197–213).
Acknowledgements
Lein Harn and Chingfang Hsu contributed equally to this work. This work was partially supported by the National Natural Science Foundation of China (Grants No. 61772224) and Natural Science Foundation of Hubei Province (Grant No. 2017CFB303).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Harn, L., Hsu, C. & Xia, Z. Lightweight and flexible key distribution schemes for secure group communications. Wireless Netw 27, 129–136 (2021). https://doi.org/10.1007/s11276-020-02449-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02449-2