WSEAS Transactions on Communications


Print ISSN: 1109-2742
E-ISSN: 2224-2864

Volume 17, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Cryptographic Security of Individual Instances for Conference Key Distribution

AUTHORS: Songsong Dai, Sizhao Li, Yangbing Wu, Donghui Guo

Download as PDF

ABSTRACT: A conference key distribution is a scheme that allows the designated subset of users to compute a shared key for secure communication. In this paper we analyze secure instances of conference key distribution based on the ideas of Kolmogorov complexity. First, Kolmogorov complexity is used as a measure of the individual security in conference key distribution, we present a model for conference key distribution in terms of Kolmogorov complexity. Then, Kolmogorov complexity is used as a measure of the amount of randomness needed by secure instances of conference key distribution. Thus we give the lower bounds holding in the model for each user needed to store. Moreover, we give lower bounds on the amount of information in conference key distribution for various types of combinatorial structures

KEYWORDS: Cryptography, Conference key distribution, Combinatorial design, Cryptographic security, Kolmogorov complexity

REFERENCES:

[1] Alimomeni, M., Safavi-Naini, R.: Guessing secrecy. In: Proc. of the 6th International Conference on Information Theoretic Security (ICITS 2012), LNCS7412, Springer-Verlag, pp.1–13 (2012).

[2] Allender, E.: Some consequences of the existence of pseudorandom generators. J. Comput. System Sci.,Vol. 39, pp.101-124 (1989).

[3] Antunes, L., Laplante, S., Pinto, A., et al.,: Cryptographic security of individual instances. In Proc. 3th Int. Conf. on Information Theoretical Security (ICITS 2007), Madrid, Spain, May 25-29, LNCS 4883, Springer, Berlin Heidelberg, pp. 195-210 (2009).

[4] Antunes, L., Matos, A., Pinto, A., Souto, A., Teixeira, A.: One-Way Functions Using Algorithmic and Classical Information Theories. Theory Comput Syst. 52(1), 162–178 (2013).

[5] Blom R.: An optimal class of symmetric key generation systems. In: EUROCRYPT, 1984. Lecture Notes in Computer Science, vol. 209, pp. 335–338 (1985).

[6] Blundo C., D’Arco P.: An Information Theoretic Model for Distributed Key Distribution, In: Proceedings of the 2000 IEEE International Symposium on Information Theory, p. 270, (2000).

[7] Blundo C., D’Arco P.: Analysis and Design of Distributed Key Distribution Centers, J. Cryptology 18 391414 (2005).

[8] Blundo C., De Santis A., Herzberg A., Kutten S., Vaccaro U., Yung M.: Perfectly Secure Key Distribution for Dynamic Conferences, Inf. Comput. 146(1) : 1–23(1998).

[9] Blundo C., De Santis A., Vaccaro, U.: Randomness in Distribution Protocols, Inf. Comput. 131: 111–139(1996).

[10] Bose M., Dey A., Mukerjee R.: Key predistribution schemes for distributed sensor networks via block designs. Des. Codes Cryptogr. 67, 111- 136.(2013)

[11] C¸ amtepe S., Yener B .: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15, 346-358 (2007).

[12] Dai, S., Guo, D.: Comparing security notions of secret sharing schemes. Entropy, 17, 1135-1145 (2015).

[13] Dodis, Y.: Shannon Impossibility, Revisited, In: Proc. 6th Int.Conf. on Information Theoretical Security (ICITS 12), Montreal, QC, August 15- 17, Springer, Berlin. 2012, pp.100–110.

[14] Dong J., Pei D., Wang X.: A key predistribution scheme based on 3-designs. In: INSCRYPT 2007. Lecture Notes in Computer Science, vol. 4990, pp. 81-92, Springer, Berlin (2008).

[15] Fiat A., Naor M.: broad cast encryption , Advances in Cryptology-CRYPTO 1993, D. Stinson(Ed.), LNCS 773, Springer-Verlag, pp. 480- 491, 1994.

[16] Fuller, B., O’Neill, A., Reyzin, L.: A unified approach to deterministic encryption: New constructions and a connection to computational entropy. J. Cryptol. 2013, DOI: 10.1007/s00145- 013-9174-5.

[17] Iwamoto, M., Shikata, J.: Information theoretic security for encryption based on conditional Renyi entropies, Information Theoretic Se- ´ curity. Springer International Publishing, 2014, pp.103–121

[18] Kaced, T.: Almost-perfect secret sharing, Information Theory Proceedings (ISIT), 2011, IEEE International Symposium on. IEEE, pp. 1603- 1607 (2011).

[19] Lee J., Stinson D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), vol. 2 , pp. 1200-1205.

[20] Lee J., Stinson D.R.: Common intersection designs. J. Comb. Des. 14, 251269 (2006).

[21] Lee J., Stinson D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11(2), article No. 1 (2008).

[22] Leung-Yan-Cheong, S.K., Cover, T.M.: Some equivalences between Shannon entropy and Kolmogorov complexity. IEEE Trans. Inf. Theory. 24,331–339 (1978).

[23] Li M., Vitanyi P.M.B.: An Introduction to Kol- ´ mogorov Complexity and Its Applications, third ed., Springer-Verlag, New York, (2008).

[24] Longpre, L., Mocas, S.: Symmetry of informa- ´ tion and one-way functions. Inf. Process. Lett. 46(2), 95–100 (1993).

[25] Longpre, L.,Watanabe, O.: On symmetry of in- ´ formation and polynomial time invertibility. Inf. Comput. 121(1), 14–22 (1995).

[26] Matsumoto, T., Imai, H.: On the Key Predistribution System: A Practical Solution to the Key Distribution Problem, Advances in CryptologyCRYPTO’87, LNCS 239, Springer-Verlag, pp. 185-193, 1987.

[27] Paterson M.B., Stinson D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Cryptogr. 71, 433-457.(2014)

[28] Pinto, A.: Comparing notions of computational entropy. Theory Comput Syst. 45,944–962 (2009).

[29] Ruj S., Roy B.: Key predistribution using partially balanced designs in wireless sensor networks. In: Proceedings of ISPA 2007. Lecture Notes in Computer Science, vol. 4742, pp. 431- 445 (2007).

[30] Ruj S., Roy B.: Revisiting key predistribution using transversal designs for a grid-based deployment scheme. Int. J. Distrib. Sens. Netw. 5, 660-674 (2008).

[31] Ruj S., Roy B.: Key predistribution using combinatorial designs for a grid-group deployment scheme in wireless sensor networks. ACM Trans. Sens. Netw. 6(1), article No. 4 (2009).

[32] Ruj S., Seberry J., Roy B.: Key predistribution schemes using block designs in wireless sensor networks. In: 2009 international conference on computational science and engineering, pp. 873- 878 (2009).

[33] Safavi-Naini R., Jiang S.: Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions. Int. J. Found. Comput. Sci. 22(6), 1369-1393 (2011)

[34] Shannon, C.E.: Communication theory of secrecy systems. Bell Tech. J. 28, 656–715 (1949).

[35] Stinson D.R.: Combinatorial Designs, Constructions and Analysis. Springer, New York (2004).

[36] Tadaki, K., Doi, N.: Cryptography and Algorithmic Randomness. Theory Comput Syst, 56, 544- 580(2015).

[37] Teixeira A., Matos A., Souto A., Antunes L.: Entropy measures vs. kolmogorov complexity. Entropy, 13 (3) 595-611(2011).

WSEAS Transactions on Communications, ISSN / E-ISSN: 1109-2742 / 2224-2864, Volume 17, 2018, Art. #14, pp. 111-119


Copyright © 2018 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site