Dynamic Authenticated Secure Group Communication

Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issue in Secure Group communication. We develop a protocol for Secure Authentic Communication where we address authentication for the group communication scheme proposed by Blundo et al. which only provides confidentiality. Authentication scheme used is a multiparty authentication scheme which allows all the users in the system to send and receive messages simultaneously. Our scheme is secure against colluding malicious parties numbering fewer than k.




References:
[1] R. Aparna, B.B. Amberker, Prashant Koulgi. Multi-sender Multireceiver
Message Authentication and an Application to Verifiable Secret
Sharing. National conference on Mathematical Foundations of Coding,
Complexity, Computation and Cryptography, IISc., Bangalore , June
2006.
[2] Blom, R.: An Optimal Class of Symmetric Key Generation Systems, in
Advances in Cryptology-Eurocrypt -84, LNCS, 209 (1985), 335-338.
[3] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung.
Perfectly Secure Key Distribution for Dynamic Conferences, in
Advances in Cryptology-CRYPTO-92.
[4] M. Burmester. and Y. Desmedt, A Secure and Efficient Conference Key
Distribution System, Advances in Cryptology - EUROCRYPT-94.
[5] Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver/Multi-sender
Network Security: Efficient Authenticated Multicast/Feedback, IEEE
Infocom -92, pp.2045-2054, (1992).
[6] W. Diffie and M. Hellman. New Directions in Cryptography. IEEE
Transactions on Information Theory, IT-22(6):644-654, Nov 1976.
[7] A. Fiat and M. Naor, Broadcast Encryption. In D.R.Stinson, editor,
Proceedings of CRYPTO-93, pp 480-491.
[8] A.T. Sherman and D.A. McGrew. Key Establishment in Large Dynamic
groups using One-way Function trees. IEEE Transactions on Software
Engg. 2003, pp 444-458.
[9] M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman key distribution
extended to group communication. In SIGSAC proceedings of the third
ACM conference on Computer and Communications Security. New
Delhi, India, March 1996., ACM, New York, pp.31-37.
[10] D. Wallner, E. Harder and R.Agee. Key Management for Multicast:
Issues and Architectures. Request for Comments (Informational) 2627,
Internet Engineering Task Force, June 1999.
[11] C. Wong, M. Gouda, and S. Lam. Secure Group Communication Using
key Graphs. In proceedings of the ACM SIGCOMM-98, Oct. 1998.
[12] C.K.Wong., Simon S. Lam., Keystone: A Group key management
service, In proceedings of International conference on
Telecommunications, Acapulco, Mexico, May 2000.
[13] Safavi-Naini, R., Wang, H.: New Results on Multi-receiver
Authentication codes, In Advances in Cryptology-Eurocrypt -98, LNCS,
1438 (1998), 527-541.
[14] Safavi-Naini, R., Wang, H.: Multi-receiver authentication codes:
Models, Bounds, Constructions and Extensions, Information and
Computation, 151, pp.148-172, (1999).
[15] Safavi-Naini, R., Wang, H.: Broadcast Authentication for Group
Communication, Theoretical Computer Science, 269 (1-2), pp.1-21,
(2001).
[16] Simmons, G.J.: A Survey of Information Authentication, in
Contemporary Cryptology, The Science of Information Integrity,
G.J.Simmons, ed., IEEE Press, 1992, 379-419.