Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Abstract

The existing key management schemes have adopted the passive adversarial model to analyze the forward secrecy and backward secrecy security requirements. However, the more realistic model is the strong active outsider adversary model wherein a legitimate group user can be compromised by the outsider adversary. In this work, we analyze the security of the Chinese remainder theorem based key management schemes under strong active outsider adversary model. We show that the schemes are insecure and we reason for their insecurity. Also, we provide a generic approach to make the schemes based on Chinese remainder theorem as secure against strong adversary. We conclude that, to make these schemes secure against strong adversary, the cost for every rekeying event requires the cost of initial group set up. That is, for rekeying upon user join or leave, it requires n secure channels for a group of n users which is costly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aparna, R., Amberker, B.B.: A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manag. 20(6), 383–418 (2010)

    Article  Google Scholar 

  2. Burton, D.: Elementary number theory (2011). https://books.google.co.in/books?id=3KiUCgAAQBAJ

  3. Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: INFOCOM, pp. 1952–1960. IEEE (2011)

    Google Scholar 

  4. Chiou, G.H., Chen, W.T.: Secure broadcasting using the secure lock. IEEE Trans. Software Eng. 15(8), 929–934 (1989)

    Article  Google Scholar 

  5. Guo, C., Chang, C.C.: An authenticated group key distribution protocol based on the generalized chinese remainder theorem. Int. J. Commun. Syst. 27(1), 126–134 (2014)

    Article  Google Scholar 

  6. Jho, N.-S., Hwang, J.Y., Cheon, J.H., Kim, M.-H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559–574. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_33

    Chapter  Google Scholar 

  7. Joshi, M.Y., Bichkar, R.S.: Scalable key transport protocol using chinese remainder theorem. In: Thampi, S.M., Atrey, P.K., Fan, C.-I., Perez, G.M. (eds.) SSCC 2013. CCIS, vol. 377, pp. 397–402. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40576-1_39

    Chapter  Google Scholar 

  8. Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_3

    Chapter  Google Scholar 

  9. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)

    Article  Google Scholar 

  10. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software Eng. 29(5), 444–458 (2003)

    Article  Google Scholar 

  11. Vijayakumar, P., Bose, S., Kannan, A.: Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf. Secur. 8(3), 179–187 (2014)

    Article  Google Scholar 

  12. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  13. Xu, S.: On the security of group communication schemes based on symmetric key cryptosystems. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, pp. 22–31 (2005)

    Google Scholar 

  14. Xu, S.: On the security of group communication schemes. J. Comput. Secur. 15(1), 129–169 (2007)

    Article  Google Scholar 

  15. Zheng, X., Huang, C.T., Matthews, M.: Chinese remainder theorem based group key management. In: Proceedings of the 45th Annual Southeast Regional Conference, ACM-SE 45, pp. 266–271. ACM, New York (2007)

    Google Scholar 

  16. Zhou, J., Ou, Y.: Key tree and Chinese remainder theorem based group key distribution scheme. In: Hua, A., Chang, S.-L. (eds.) ICA3PP 2009. LNCS, vol. 5574, pp. 254–265. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03095-6_26

    Chapter  Google Scholar 

  17. Zhou, J., Ou, Y.: Key tree and chinese remainder theorem based group key distrubution scheme. J. Chin. Inst. Eng. 32(7), 967–974 (2009)

    Article  Google Scholar 

  18. Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: INFOCOM, pp. 538–546. IEEE (2008)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the Science and Engineering Research Board (SERB), Department of Science & Technology (DST), Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. R. Purushothama .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Purushothama, B.R., Verma, A.P., Kumar, A. (2017). Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation